The program goals

  • To reduce the risk of a Partner's software being wrongly classified as malicious - known as false positive detections;
  • To ensure a positive experience for users when they download and use Partner's and Kaspersky Lab software;
  • To significantly reduce the load placed on the support services of both the Partner and Kaspersky Lab.


  • The participation in the program is free-of-charge;
  • Verified compatibility with the actual configurations of antivirus protection offered by Kaspersky Lab; Reduced risk of false alarms generated by antivirus protection in the event of non-standard behavior of the Partner’s software;
  • Independent 3rd party SW expertise provided by Kaspersky Lab – a leader in the area of anti-virus defense and information security.

Participation requirements for Whitelist program

  • Company must have a working web site.
  • Company’s web site must contain company’s legal address.
  • Company’s software and its web site must not promote religious, political, or pseudo-scientific ideas.
  • Company’s software must not replicate third-party products interface or standard operating system messages. Company’s software must not display fake messages allegedly provided by a third party.
  • Every web site and software control icon and its title must unambiguously signify the associated action.
  • Company’s software must not advertise or promote third-party software or web resources, unless they are used as a launch platform (like Steam or Origin).
  • Software code or configuration files (including downloads) must not contain functions that make the software call malicious resources or resources hosting Potentially Unwanted Programs (PuP).
  • Digital signature (if Company has one) must not be used by other vendors and/or compromised (there must be no registered cases of the signature having been used by malware or PuP).
  • Remote administration program will not be added, if:
    • The software is known to have been used by hackers. For example, the program was used as a Backdoor component.
    • Program can be used to remotely access a computer without notifying the user.

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.

Accept and Close