User guide

A D V A N C E D A P P L I C A T I O N S E T T I N G S
125
3. In the left part of the window, in the Protection Center section, select the Proactive Defense component.
4. In the right part of the window, uncheck the Enable Proactive Defense box if you need to disable this
component. Check this box if you need to enable the component.
CREATING A GROUP OF TRUSTED APPLICATIONS
Programs recognized by the Security Zone component as Trusted pose no threat for the system. However, their
activities will also be monitored by Proactive Defense.
You can create a group of trusted applications; Proactive Defense will not monitor their activity. By default, the list of
trusted applications includes applications with verified digital signature and applications from Kaspersky Security Network
database.
To change the settings of the trusted applications group, perform the following steps:
1. Open the main application window.
2. In the top part of the window, click the Settings link.
3. In the left part of the window, in the Protection Center section, select the Proactive Defense component.
4. In the right part of the window, in the Trusted applications section, check the boxes next to the required
settings.
USING THE DANGEROUS ACTIVITY LIST
The list of actions typical of dangerous activity cannot be edited. You can turn off monitoring for one dangerous activity or
another.
To turn off monitoring for one dangerous activity or another:
1. Open the main application window.
2. In the top part of the window, click the Settings link.
3. In the left part of the window, in the Protection Center section, select the Proactive Defense component.
4. Click the Settings button in the right part of the window.
5. In the Proactive Defense window that opens, uncheck the box next to the type of activity which you do not want
to be monitored.
CHANGING THE DANGEROUS ACTIVITY MONITORING RULE
Applications' actions classified as dangerous activity cannot be edited. You can perform the following actions:
turn off monitoring for any activity (see page 125);
create an exclusion list, by listing applications the activities of which you do not consider dangerous;
edit the rule that Proactive Defense uses when it detects dangerous activity.