|
||
ProtectionProtection is started at operating system startup and is RAM resident. Protection allows on-access scanning of all files that are opened, saved and launched, and all applications that are installed. Protection mode The mode used by Protection to track changes in the file system and to scan it for malicious objects. The following modes are available:
Cloud Security Scan Newly installed applications are scanned additionally using the Kaspersky Security Network cloud service (a special Kaspersky Lab online service that contains information about the reliability of files, applications, and Internet resources). Scan using the cloud service helps to protect your data from new and unknown threats. If the switch is flipped to enabled, Kaspersky Tablet Security will carry out additional scans on newly installed applications before they are launched for the first time by using the Kaspersky Security Network cloud service. If the switch is flipped to disabled, Kaspersky Tablet Security does not perform additional scans. This setting is available if Protection mode is set to either Recommended or Extended. Detection of adware and other applications that may harm your device. This category includes applications that attempt to access to your personal data, send SMS messages or your location coordinates. If the check box is selected, Kaspersky Tablet Security detects such applications and alerts you when they are detected. If the check box is cleared, Kaspersky Tablet Security skips applications in this category. You can select the types of files that the application scans for the presence of malicious objects, and specify the action for the application to perform on files in which it detects threats. The settings section is available if Protection mode is set to Extended. Type of files to scan Selection of the type of files, that Protection scans for the presence of malicious objects. Protection scans files of selected types when any action is performed on them (for example, when they are opened, copied, run, moved, saved, or modified). You can select files of the following types:
Action on threat detection Selection of the action that the application performs on detection of a threat. You can select one of the following actions:
Regardless of the selected action, the application notifies you that a threat has been detected. |
||
|