How to protect against file-encrypting malware in Kaspersky Endpoint Security 11 for Windows

 

Kaspersky Endpoint Security 11 for Windows

 
 
 

How to protect against file-encrypting malware in Kaspersky Endpoint Security 11 for Windows

Back to "Settings and Features"
Latest update: September 07, 2022 ID: 14742
 
 
 
 

This article concerns:

  • Kaspersky Endpoint Security 11.10.0 for Windows (version 11.10.0.399)
  • Kaspersky Endpoint Security 11.9.0 for Windows (version 11.9.0.351)
  • Kaspersky Endpoint Security 11.8.0 for Windows (version 11.8.0.384)
  • Kaspersky Endpoint Security 11.7.0 for Windows (version 11.7.0.669)
  • Kaspersky Endpoint Security 11.6.0 for Windows (version 11.6.0.394)
  • Kaspersky Endpoint Security 11.5.0 for Windows (version 11.5.0.590)
  • Kaspersky Endpoint Security 11.4.0 for Windows (version 11.4.0.233)
  • Kaspersky Endpoint Security 11.3.0 for Windows (version 11.3.0.773)
  • Kaspersky Endpoint Security 11.2.0 for Windows (version 11.2.0.2254)
  • Kaspersky Endpoint Security 11.1.1 for Windows (version 11.1.1.126)
 
 
 
 

To reduce the risk of being infected by cryptoviruses (malware that encrypts your files and demand a ransom), we recommend that you enable the following protection components:

The instructions described in this article cannot be used to protect resources located in the network. No matter if the file location is specified as a mapped drive or a UNC path, files on network shares will not be protected. To protect files located in the network, use special solutions. For example, Kaspersky Security for Windows Server

 
 
 
 
 

How to configure protection against file-encrypting malware locally in Kaspersky Endpoint Security for Windows versions 11.7.0–11.10.0

 
 
 
 
 

How to configure protection against file-encrypting malware locally in Kaspersky Endpoint Security for Windows versions 11.5.0–11.6.0

 
 
 
 
 

How to configure protection against file-encrypting malware locally in Kaspersky Endpoint Security for Windows versions 11.1.1–11.4.0

 
 
 
 
 

How to set up protection against file-encrypting malware remotely

 
 
 
 
 

Types of files which are encrypted by malware

 
 
 
 
 

How to submit suspicious files for analysis

 
 
 
 
Was this information helpful?
Yes No
Thank you
 

 
 

How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.

OK