User guide

K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0
28
Figure 16: Configuring actions to be performed with objects
3. Using the Action item, select the application's response when it detects a malware object (see Figure below):
Delete: delete detected malware objects without notifying the user.
Quarantine: quarantine detected malicious objects.
Ask user: when an infected object is detected, display a notification with a prompt for action.
Log event: skip a malware object and record the information about its detection in the program log.
Try to disinfect disinfect malware objects. If the disinfection is not possible, perform an action specified in
the If disinfection fails item.