The program goals

  • To reduce the risk of a Partner's software being wrongly classified as malicious - known as false positive detections;
  • To ensure a positive experience for users when they download and use Partner's and Kaspersky software;
  • To significantly reduce the load placed on the support services of both the Partner and Kaspersky.


  • The participation in the program is free-of-charge;
  • Verified compatibility with the actual configurations of antivirus protection offered by Kaspersky; Reduced risk of false alarms generated by antivirus protection in the event of non-standard behavior of the Partner’s software;
  • Independent 3rd party SW expertise provided by Kaspersky – a leader in the area of anti-virus defense and information security.

Participation requirements for Whitelist program

  • Company must have a working web site.
  • Company’s web site must contain company’s legal address.
  • Company’s software and its web site must not promote religious, political, or pseudo-scientific ideas.
  • Company’s software must not replicate third-party products interface or standard operating system messages. Company’s software must not display fake messages allegedly provided by a third party.
  • Every web site and software control icon and its title must unambiguously signify the associated action.
  • Company’s software must not advertise or promote third-party software or web resources, unless they are used as a launch platform (like Steam or Origin).
  • Software code or configuration files (including downloads) must not contain functions that make the software call malicious resources or resources hosting Potentially Unwanted Programs (PuP).
  • Digital signature (if Company has one) must not be used by other vendors and/or compromised (there must be no registered cases of the signature having been used by malware or PuP).
  • Remote administration program will not be added, if:
    • The software is known to have been used by hackers. For example, the program was used as a Backdoor component.
    • Program can be used to remotely access a computer without notifying the user.
  • The software does not use deliberately misleading language to describe the state of a user’s computer to trick users into paying for the software.