Participate in Whitelist

In response to the ever-increasing amount of malware on public networks, Kaspersky Lab has initiated a program to create a knowledge database of all available trusted software.

Users and software providers both suffer when non-malicious programs are wrongly flagged as malicious by anti-virus applications (more commonly known as false positive detections). The Kaspersky Lab White List database will provide a solution to the problem.

The program goals

The program goals
  • To reduce the risk of a Partner's software being wrongly classified as malicious - known as false positive detections;

  • To ensure a positive experience for users when they download and use Partner's and Kaspersky Lab software;

  • To significantly reduce the load placed on the support services of both the Partner and Kaspersky Lab;


  • Verified compatibility with the actual configurations of antivirus protection offered by Kaspersky Lab; Reduced risk of false alarms generated by antivirus protection in the event of non-standard behavior of the Partner’s software;

  • Independent 3rd party SW expertise provided by Kaspersky Lab – a leader in the area of anti-virus defense and information security;

  • The participation in the program is free-of-charge;

Participation requirements for Whitelist program

  • Company must have a working web site.

  • Company’s web site must contain company’s legal address.

  • Company’s software and its web site must not promote religious, political, or pseudo-scientific ideas.

  • Company’s software must not replicate third-party products interface or standard operating system messages. Company’s software must not display fake messages allegedly provided by a third party.

  • Every web site and software control icon and its title must unambiguously signify the associated action.

  • Company’s software must not advertise or promote third-party software or web resources, unless they are used as a launch platform (like Steam or Origin).

  • Software code or configuration files (including downloads) must not contain functions that make the software call malicious resources or resources hosting Potentially Unwanted Programs (PuP).

  • Digital signature (if Company has one) must not be used by other vendors and/or compromised (there must be no registered cases of the signature having been used by malware or PuP).

  • Remote administration program will not be added, if:

    • The software is known to have been used by hackers. For example, the program was used as a Backdoor component.

    • Program can be used to remotely access a computer without notifying the user.



Registration is available for software vendors and developers interested in proactive solution of false positive detections today, or in the future.

Go to Registration