Kaspersky Security Cloud
- About Kaspersky Security Cloud
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Connecting to My Kaspersky
- Activating the application
- Completing activation
- How to upgrade the application
- Installing over other Kaspersky applications
- Installing the application from the command prompt
- How to protect your mobile device
- Getting started
- How to uninstall the application
- Application licensing
- Information provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Technical Support
- About using the application in the European Union
- Why My Kaspersky is needed
- Managing application notifications
- Security news
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to change Safe Money settings
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- Protecting your passwords on the Internet
- Web tracking protection
- Weak settings control in the operating system
- Anti-Banner protection during website browsing
- Webcam Protection
- Account Check
- Protection for kids
- Devices in my network
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to change Application Control settings
- About protecting an audio stream coming from sound recording devices
- How to change audio stream protection settings
- How to change Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky
- Trusted Applications mode
- File Shredder
- Unused Data Cleaner
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Storing data in data vaults
- Hard Drive Health Monitor
- How to password-protect access to Kaspersky Security Cloud management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Using the application from the command prompt
- Evaluating Kaspersky Security Cloud
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Data vault
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
System Watcher settings
With this button, you can enable / disable System Watcher.
If the button is green, System Watcher collects and saves data on all events that occur in the operating system (such as modification of a file, modification of registry keys, startup of drivers, or attempts to shut down the computer). This data is used to track malicious and other activity of software (including ransomware) and to restore the operating system's condition as it had been before software appeared (to roll back the actions of the software). In some cases, activity of applications cannot be rolled back, for example when an application was detected by the Application Control component.
System Watcher collects data from various sources, including other components of Kaspersky Security Cloud. System Watcher analyzes application activity and provides other Kaspersky Security Cloud components with the collected information about events.
In the Automatic Exploit Prevention section, you can configure the actions that the application performs when executable files are run by vulnerable applications.
Monitor attempts to perform unauthorized operations
With this check box, you can enable / disable
A software code that uses a vulnerability in the system or software. Exploits are often used to install malware on the computer without user's knowledge.
If this check box is selected, Kaspersky Security Cloud tracks executable files run by vulnerable applications. If Kaspersky Security Cloud detects an attempt to run an executable file from a vulnerable application that has not been initiated by the user, the application performs the action that is selected in the On threat detection drop-down list.
In this drop-down list, you can select the action that System Watcher performs when an executable file is run from a monitored vulnerable application.
This list allows choosing from the following actions:
- Select action automatically. System Watcher automatically performs the action selected in the application settings and adds information on the selected action to the report.
In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.
- Prompt for action. System Watcher prompts the user for action.
In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.
- Allow action. System Watcher allows the executable file to be run.
- Block action. System Watcher blocks the executable file.
Action on detection of malicious or other activity
In this drop-down list, you can select the action that System Watcher performs when malicious or other activity is detected based on the results of analysis of application activity.
This list allows choosing from the following actions:
- Prompt for action. System Watcher prompts the user for action.
In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.
- Select action automatically. System Watcher automatically selects the action that Kaspersky specialists recommend taking on the application.
In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.
- Delete the application. System Watcher deletes the application.
- Terminate the application. System Watcher terminates all processes of the application.
- Ignore. System Watcher takes no actions on the application.
Action to perform if malicious or other activity can be rolled back
In this drop-down list, you can select the action that System Watcher performs when it is possible to roll back malicious or other activity of the application.
This list allows choosing from the following actions:
- Prompt for action. If System Watcher, File Anti-Virus, or the results of a scan task confirm that it is necessary to perform a rollback, System Watcher prompts the user for action.
In interactive protection mode, this option is selected by default. In automatic protection mode, the option is unavailable.
- Select action automatically. If System Watcher analyzes the activity of an application and considers it to be malicious, it rolls back the application's activity and notifies the user of this event.
System Watcher adds information about the event and processing results to a report.
In automatic protection mode, this option is selected by default. In interactive protection mode, the option is unavailable.
- Roll back. System Watcher rolls back malicious or other activity of the application.
- Do not roll back. System Watcher saves information about malicious or other activity but does not roll back application's actions.
In the Protection against screen lockers section, you can configure the actions that Kaspersky Security Cloud performs if screen locker activity is detected. Screen lockers are malicious programs that limit the user's operations on a computer, by locking the screen and the keyboard, or by blocking access to the taskbar and shortcuts. Screen lockers may attempt to extort ransom for recovery of access to the operating system. By using protection against screen lockers, you can close any screen locker by pressing a specified combination of keys.
Detect and close screen lockers
This check box enables / disables protection against screen lockers.
If this check box is selected, when activity of a screen locker is detected, you can halt it by pressing the combination of keys that is specified in the drop-down list under the check box.
Use the following key combination to close a screen locker manually
In the drop-down list, you can select a key or a combination of keys, which, when pressed, triggers screen locker protection for detecting and deleting a screen locker.