Patch is available for testing now.


Update sources:



Please note that to install the patch in KSeC (KSDE), you need to update the product from the test server using the commands below.

Windows x86cd "%ProgramFiles%\Kaspersky Lab\Kaspersky Secure Connection 5.3"avp.com update http://dnl-test.kaspersky-labs.com/ap2
Windows x64cd "%ProgramFiles(x86)%\Kaspersky Lab\Kaspersky Secure Connection 5.3"avp.com update http://dnl-test.kaspersky-labs.com/ap2

Check the presence of a patch in the standard windows "Support", "About the program."


∙ Some issues with sites work
∙ Some FireFox compatibility issues.
∙ Some times patch installation can cause issue with sound.
∙ 'Support' window contain wrong information about OS - shows Windows 10 instead of Windows 11.
∙ Could not log in to online storage in Backup process.
∙ Compatibility issues when product works along with another software that intercepts DNS traffic.
∙ 'Scan for viruses' context menu element disappeared after product upgrade.
∙ Very rar situation, when keyboard enter isn't work if 'Safe payments' function is active.
∙ Missing Kaspersky's uninstallation items on Start menu
∙ DNS error for short time after VPN session start on latest versions of Windows 10, 11.
∙ Rar VPN channel instability issues.
∙ Several stability issues

Scope features:
∙ Windows 11 full support
∙ Windows 10 21H2 full support
∙ MS Bypass IO feature support



To begin testing you need to do next:

1. Install product

2. Update from public servers and reboot OS

3. Enable traces

4. Set Manual mode of Update

5. Set Update source: http://dnl-test.kaspersky-labs.com/ap2

6. Reboot OS



As usual I'd like to remind you:

1) If you found any problem, please, re-check it on the previous patch. Here we are looking only for bugs related to current patch.

2) Don't forget about traces and screenshots.


Bug report: version 2021MR3

Flood will be deleted.

There are no topics in this category.
Why don't you try posting one?

Looks like your connection to Beta Testing was lost, please wait while we try to reconnect.