{"id":2407,"date":"2013-10-02T10:25:41","date_gmt":"2013-10-02T14:25:41","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=2407"},"modified":"2020-02-26T18:57:50","modified_gmt":"2020-02-26T14:57:50","slug":"tip-of-the-week-the-strictest-computer-protection","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/tip-of-the-week-the-strictest-computer-protection\/2407\/","title":{"rendered":"Tip Of The Week: The Strictest Computer Protection"},"content":{"rendered":"<p>Do you have a personal computer at home that is not actually personal because it is meant for family use? Do your loved ones use it for work and Internet surfing? If so, each member of your family probably installs whatever they need, changing system settings, visiting various websites and so on. It\u2019s probably all done under the same user account as well, with no protection at all. So what happens as a result? Your computer becomes a virus-breeder, which poses a threat to you and your family\u2019s data.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101958\/19.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2830\" alt=\"19\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101958\/19.gif\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>To make your computer experience safer, a mode named <b>Trusted Applications<\/b> has been introduced in <a href=\"http:\/\/kaspersky.com\/multi-device-security\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security 2014<\/a>. It blocks the attempts to launch programs that are considered untrusted (e.g. those that have no information in <a href=\"https:\/\/www.kaspersky.com\/blog\/ksn\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network<\/a> or those downloaded from an unreliable resource). In other words, it will only run trusted applications in a mode that ensures their safety on your computer.<\/p>\n<p>By default, the option is disabled. Once you enable it, be prepared for your computer\u2019s behavior to be surprisingly strict. Initially, the product will take an inventory of all applications used, as well as dynamic libraries and scripts, referring to the Kaspersky Lab trusted application database. The analysis may take several hours, but, fortunately, it is only performed during the activation of the <b>Trusted Applications<\/b> mode and is not needed regularly. When it is over, you will be given the results. You can make changes if you want to re-categorize some applications and, that\u2019s it! You are ready to work while being protected at a higher level.<\/p>\n<p>To enable the <b>Trusted Applications<\/b> mode:<\/p>\n<ol>\n<li>Open <b>Kaspersky Internet Security 2014<\/b> and slide up the panel with the product components.<\/li>\n<li>Select\u00a0<b>Application Control<\/b>.<\/li>\n<li>Click the <b>Enable <\/b>link under the message <b>Trusted Applications mode is disabled<\/b>. System files and installed application analysis will start. Wait until it\u2019s over.<\/li>\n<\/ol>\n<p align=\"center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101957\/1_en-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2827\" alt=\"1_en (2)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101957\/1_en-2.png\" width=\"600\" height=\"454\"><\/a><\/p>\n<p>If the analysis discovers system files or programs with insufficient information about them, you will see the respective message in the <b>Trusted Applications mode<\/b> window. To view the list of all unknown files, click the link <b>Go to the list of unknown system files<\/b>.<\/p>\n<p>Sometimes the application may discover too many system files and\/or programs about which there is not enough information to consider them completely safe. In this case, it is not recommended you enable the <b>Trusted Applications<\/b> mode. To refrain from using it, click the button <b>Do not enable<\/b> <b>Trusted Applications mode<\/b>.<\/p>\n<p>If you would like to turn the <b>Trusted Applications<\/b> mode on, but still allow the discovered unknown files to run, click the link <b>Allow unknown system files and continue<\/b>.<\/p>\n<p align=\"center\">\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101955\/2_en-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2828\" alt=\"2_en (1)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101955\/2_en-1.png\" width=\"600\" height=\"454\"><\/a><\/p>\n<p>Go to the next step, make changes to the blocked applications list (if necessary), click the button\u00a0<b>Enable Trusted Applications mode by default<\/b>.<\/p>\n<p align=\"center\">\u00a0<a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101953\/3_en.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-2829\" alt=\"3_en\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/10\/05101953\/3_en.png\" width=\"600\" height=\"454\"><\/a><\/p>\n<p><b>Please note:<\/b> the <b>Trusted Applications<\/b> mode\u00a0only works when <a href=\"http:\/\/support.kaspersky.com\/9732\" target=\"_blank\" rel=\"noopener\"><b>Application Control<\/b><\/a>, File Anti-Virus, and <a href=\"http:\/\/support.kaspersky.com\/9778\" target=\"_blank\" rel=\"noopener\"><b>System Watcher<\/b><\/a> are enabled.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you have a personal computer at home that is not actually personal because it is meant for family use? Do your loved ones use it for work and Internet<\/p>\n","protected":false},"author":196,"featured_media":2408,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[180,420],"class_list":{"0":"post-2407","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-kaspersky-internet-security","9":"tag-tip-of-the-week"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/tip-of-the-week-the-strictest-computer-protection\/2407\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/tip-of-the-week-the-strictest-computer-protection\/2509\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/tip-of-the-week-the-strictest-computer-protection\/2633\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/tip-of-the-week-the-strictest-computer-protection\/2471\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/tip-of-the-week-the-strictest-computer-protection\/2825\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/tip-of-the-week-the-strictest-computer-protection\/2062\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/tip-of-the-week-the-strictest-computer-protection\/2825\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/tip-of-the-week-the-strictest-computer-protection\/2825\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/kaspersky-internet-security\/","name":"kaspersky internet security"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2407","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/196"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=2407"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2407\/revisions"}],"predecessor-version":[{"id":15628,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/2407\/revisions\/15628"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/2408"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=2407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=2407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=2407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}