Reduce the number of false positives in Kaspersky products and lower the risk of incorrectly classifying participant software
Significantly reduce the burden on participant and Kaspersky support teams
Ensure the best possible user experience for Kaspersky products
Participation is free
Unbiased third-party expert evaluation by Kaspersky
Confirmed absence of false positives in current Kaspersky security solutions
Participant support
Participants must provide a link to an active website with up-to-date information on the company and its products
The site must include the company’s legal address
The site must not promote religious, political or pseudoscience content
The names of site elements for interacting with the user clearly indicate their purpose, and user interaction scenarios are unambiguous Participant software
Does not promote religious, political or pseudoscience content
Does not copy the interface of third-party products or standard operating system messages, and does not display false messages from third parties
Does not advertise or promote third-party software or web resources unrelated to the software launch platform (for example, Steam or Origin)
Does not access harmful resources or resources with potentially unwanted software
Does not use intentionally misleading language to force users to pay to use its features
Can be used as a remote administration tool on the condition that the software has not been used by cybercriminals and cannot be used for hidden remote access to user computers
The company’s digital signature (if available) is not used by other vendors and has not been compromised
Registration
Scan your files on Kaspersky Threat Intelligence Portal
The service provides up-to-date information on software identified by Kaspersky, including software submitted as part of the Allowlist Program.
Learn more
Please review the recommendations how to reduce risks of false positives
Threat Protection efficiency of Kaspersky solutions is confirmed by independent research. The protection quality is created by implementing a variety of technologies which provide both a high level of threat detection and minimum of false alarms.
In the article, you will learn what a false detection (or a false positive) is, and how to avoid it. Also, you will know how to decrease the risks of false alarms and possible damage they may cause. This article will be useful both for companies with and without a critical infrastructure. The recommendations are applicable in both cases.