Kaspersky Total Security
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- Bahasa Indonesia
- Čeština (Česká republika)
- Dansk (Danmark)
- Español (España)
- Español (México)
- Deutsch
- Français
- Italiano
- Magyar (Magyarország)
- Norsk, bokmål (Norge)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Srpski
- Suomi (Suomi)
- Svenska (Sverige)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Ελληνικά (Ελλάδα)
- Русский
- Српски
- Українська
- العربية (الإمارات العربية المتحدة)
- فارسى (ایران)
- ไทย (ไทย)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- About Kaspersky Total Security
- How to install the application
- Checking for a newer version of the application
- Starting installation of the application
- Reviewing the End User License Agreement
- Kaspersky Security Network Statement
- Installing the application
- Recommended settings
- Completing installation
- Activating the application
- Registration on My Kaspersky
- Completing activation
- Installing the application from the command prompt
- Getting started
- How to upgrade the application
- Installing over other Kaspersky applications
- Switching from Kaspersky Total Security to other Kaspersky applications
- How to uninstall the application
- Application licensing
- Information provision
- Data provision under the End User License Agreement outside the territory of the European Union
- Data provision under the End User License Agreement on the territory of the European Union
- Data provision to Kaspersky Security Network
- Saving data to the application operation report
- Saving data for Technical Support
- About using the application in the European Union
- Why My Kaspersky is needed
- Managing application notifications
- Assessing computer protection status and resolving security issues
- Update databases and application modules
- Scanning the computer
- How to restore an object deleted or disinfected by the application
- Troubleshooting the operating system after infection
- Protecting email
- Protecting personal data on the Internet
- About protection of personal data on the Internet
- About On-Screen Keyboard
- How to open On-Screen Keyboard
- How to configure the display of the On-Screen Keyboard icon
- About protection of data entered on the computer keyboard
- How to configure protection of data entered on the computer keyboard
- Checking a website for safety
- How to change encrypted connections settings
- About secure connection to Wi-Fi networks
- How to run Kaspersky Secure Connection
- Configuring notifications of vulnerabilities in Wi-Fi networks
- Protecting financial transactions and online purchases
- About protection of financial transactions and online purchases
- How to change Safe Money settings
- How to configure Safe Money for a specific website
- How to quickly open a website in Protected Browser
- How to send feedback on Safe Money
- How to enable automatic activation of the Kaspersky Protection extension
- Starting Kaspersky Password Manager
- Web tracking protection
- Anti-Banner protection during website browsing
- Webcam Protection
- Protection for kids
- How to reserve operating system resources for computer games
- Handling unknown applications
- Checking application reputation
- Controlling application activity on the computer and on the network
- How to change Application Control settings
- About protecting an audio stream coming from sound recording devices
- How to change audio stream protection settings
- How to change Application Manager settings
- Updating installed applications
- PC Cleaner
- About PC Cleaner
- How to manually start an analysis of objects
- How to configure a scheduled analysis
- How to select categories of objects for analysis
- Categories of objects detected
- Viewing the list of detected objects
- Viewing the list of exclusions
- How to send data about application or browser window to Kaspersky
- Trusted Applications mode
- File Shredder
- Unused Data Cleaner
- Backup and Restore
- About Backup and Restore
- How to create a backup task
- Step 1. Select files
- Step 2. Select folders for backup
- Step 3. Select file types for backup
- Step 4. Select backup storage
- Step 5. Creating a backup schedule
- Step 6. Setting a password to protect backup copies
- Step 7. File versions storage settings
- Step 8. Entering the backup task name
- Step 9. Wizard completion
- How to start a backup task
- Restoring data from a backup copy
- Restoring data from a backup copy using Kaspersky Restore Utility
- About Online storage
- How to activate Online storage
- Storing data in data vaults
- How to password-protect access to Kaspersky Total Security management functions
- How to remove traces of activity on the computer
- How to pause and resume computer protection
- How to restore the default application settings
- How to view the application operation report
- How to apply the application settings on another computer
- Participating in Kaspersky Security Network
- Protection using hardware virtualization
- Using the application from the command prompt
- Evaluating Kaspersky Total Security
- Contacting Technical Support
- Limitations and warnings
- Other sources of information about the application
- Glossary
- Activating the application
- Activation code
- Anti-virus databases
- Application modules
- Backup and Restore
- Blocking an object
- Compressed file
- Data vault
- Database of malicious web addresses
- Database of phishing web addresses
- Digital signature
- Disk boot sector
- Exploit
- False positive
- File mask
- Heuristic analyzer
- Hypervisor
- iChecker Technology
- Incompatible application
- Infected object
- Kaspersky Security Network (KSN)
- Kaspersky update servers
- Keylogger
- License term
- Phishing
- Probable spam
- Probably infected object
- Protected Browser
- Protection components
- Protocol
- Quarantine
- Rootkit
- Script
- Security level
- Spam
- Startup objects
- Task
- Task settings
- Threat level
- Traces
- Traffic scanning
- Trust group
- Trusted process
- Unknown virus
- Update
- Update package
- Virus
- Vulnerability
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Advanced settings of Mail Anti-Virus window
In the Protection scope section you can select the type of email messages to be scanned by Mail Anti-Virus. The default settings in this section depend on the selected level of security.
Incoming and outgoing messages
Mail Anti-Virus scans both incoming and outgoing email.
Mail Anti-Virus scans incoming email only.
In the Heuristic Analysis section, you can enable the use of heuristic analysis when scanning messages, as well as specify a level of heuristic analysis. The default settings in this section depend on the selected level of security.
This check box enables / disables
A technology for detecting threats about which information has not yet been added to Kaspersky databases. The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
The slider allows you to adjust the level of heuristic analysis. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the time required for scanning.
The following heuristic analysis levels are available:
- Light scan. Heuristic analyzer performs fewer operations found inside executable files. The probability of threat detection in this mode is somewhat lower. Scanning is faster and less resource-intensive.
- Medium scan. Heuristic analyzer performs the number of actions found within executable files recommended by the experts of Kaspersky.
- Deep scan. Heuristic analyzer performs more operations found inside executable files. The probability of threat detection in this mode is higher. Scanning consumes more system resources and takes longer.
The slider is available if the Use Heuristic Analysis check box is selected.
In the Scan of compound files section, you can configure scan of
One or several file(s) packaged into a single file through compression. A dedicated application, called an archiver, is required for packing and unpacking data.
This check box enables / disables the option to scan attached archives in Mail Anti-Virus.
Do not scan archives larger than
This check box enables / disables the option restricting the maximum size of archives which Mail Anti-Virus will scan. This feature can accelerate mail scanning.
The maximum size is specified in megabytes. By default, the value is set to 8 MB.
If this check box is selected, Mail Anti-Virus excludes archives from scanning if their size exceeds the value that you have specified.
If the check box is cleared, Mail Anti-Virus scans archives of any size.
In the Connectivity section, you can select protocols to be scanned and enable integration of Mail Anti-Virus plug-ins into Microsoft Outlook mail client.
Scan POP3, SMTP, NNTP, and IMAP traffic
If this check box is selected, Mail Anti-Virus scans the stream of email messages coming in via POP3 / SMTP / NNTP / IMAP protocols before they are downloaded to the computer.
If the check box is cleared, Mail Anti-Virus scans email messages only after they arrive on the receiving computer.
Connect Microsoft Outlook plug-in
The check box enables / disables integration of Mail Anti-Virus plug-in with Microsoft Office Outlook. This feature can be used to access the settings of Mail Anti-Virus quickly within Microsoft Office Outlook and configure scanning messages for the presence of dangerous objects.