User guide
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0
28
Figure 16: Configuring actions to be performed with objects
3. Using the Action item, select the application's response when it detects a malware object (see Figure below):
Delete: delete detected malware objects without notifying the user.
Quarantine: quarantine detected malicious objects.
Ask user: when an infected object is detected, display a notification with a prompt for action.
Log event: skip a malware object and record the information about its detection in the program log.
Try to disinfect – disinfect malware objects. If the disinfection is not possible, perform an action specified in
the If disinfection fails item.