![]() ![]() Mail Anti-Virus scans incoming and outgoing email messages on your computer. A copy of the previous file with the same name is not saved. If an infected file is placed in the same location where the deleted file with the same name used to be, Quarantine saves only a copy of the last file. A copy of the file is moved to Quarantine when that happens. If a file cannot be disinfected for any reason, it is deleted. Further access to the file is allowed only if the file is not infected or is successfully disinfected by the application. ![]() Kaspersky Free intercepts each attempt to access a file and scans the file for known viruses and other malware. The component starts upon startup of the operating system, continuously remains in the computer's RAM, and scans all files that are opened, saved, or launched on your computer and all connected drives. What follows is a description of the logic of how the protection components interact when Kaspersky Free has been set to the mode that is recommended by Kaspersky specialists (in other words, with the default application settings).įile Anti-Virus prevents infection of the computer's file system. To keep Kaspersky Free up to date, you need to update the databases and application modules used by the application. This is necessary in order to prevent any possible spreading of malicious programs that have not been discovered by protection components, for example, because a low security level was set or for other reasons. In addition to the real-time protection provided by the security components, we recommend that you regularly scan your computer for viruses and other malware. Each type of threat is handled by a dedicated protection component. Protection components are designed to protect the computer in real time against various types of information security threats, network attacks, and fraud. Various functions and protection components are available as part of Kaspersky Free to deliver comprehensive protection. Kaspersky Free provides comprehensive protection against various types of information security threats.
0 Comments
Leave a Reply. |