Participate in Whitelist

In response to the ever-increasing amount of malware on public networks, Kaspersky Lab has initiated a program to create a knowledge database of all available trusted software.

Users and software providers both suffer when non-malicious programs are wrongly flagged as malicious by anti-virus applications (more commonly known as false positive detections). The Kaspersky Lab White List database will provide a solution to the problem.

The program goals

The program goals
  • To reduce the risk of a Partner's software being wrongly classified as malicious - known as false positive detections;

  • To ensure a positive experience for users when they download and use Partner's and Kaspersky Lab software;

  • To significantly reduce the load placed on the support services of both the Partner and Kaspersky Lab;


  • Verified compatibility with the actual configurations of antivirus protection offered by Kaspersky Lab; Reduced risk of false alarms generated by antivirus protection in the event of non-standard behavior of the Partner’s software;

  • Independent 3rd party SW expertise provided by Kaspersky Lab – a leader in the area of anti-virus defense and information security;

  • The participation in the program is free-of-charge;

Participation requirements for Whitelist program

  • Company must have a working web site.

  • Company’s web site must contain company’s legal address.

  • Company’s software and its web site must not promote religious, political, or pseudo-scientific ideas.

  • Company’s software must not replicate third-party products interface or standard operating system messages. Company’s software must not display fake messages allegedly provided by a third party.

  • Every web site and software control icon and its title must unambiguously signify the associated action.

  • Company’s software must not advertise or promote third-party software or web resources, unless they are used as a launch platform (like Steam or Origin).

  • Software code or configuration files (including downloads) must not contain functions that make the software call malicious resources or resources hosting Potentially Unwanted Programs (PuP).

  • Digital signature (if Company has one) must not be used by other vendors and/or compromised (there must be no registered cases of the signature having been used by malware or PuP).

  • Remote administration program will not be added, if:

    • The software is known to have been used by hackers. For example, the program was used as a Backdoor component.

    • Program can be used to remotely access a computer without notifying the user.

  • The software does not use deliberately misleading language to describe the state of a user’s computer to trick users into paying for the software.



Registration is available for software vendors and developers interested in proactive solution of false positive detections today, or in the future.

Go to Registration