background image

Managing the logical network

 51

 

 

corresponding item in the 

Action

 menu. Rename the group using the 

General tab of the 

Properties:<Group name>

 window that will open (see 

Figure 16). 

You cannot rename the 

Groups

 folder because it is an in-built element of 

Administration Console. 

2.6.6. Deleting a group 

To delete a group from the logical network, 

in the console tree or in the results panel, select the required group folder 
and use the 

Delete 

commands in the shortcut menu or in the 

Action

 

menu. 

A group can only be deleted if it does not contain slave servers, nested groups 
or client computers. 

2.7. Client computers 

2.7.1. Adding computers to the logical 

network 

To add a computer/computers to the logical network, 

1. In 

the 

Group

 folder, select the group folder to which you wish to add 

the client computer. If you are adding a client computer to the 
highest hierarchy level, select the 

Groups

 folder. 

2.  Either open the shortcut menu and use the 

New Computer

 

command, or use the corresponding command in the 

Action

 menu. 

This will launch the corresponding wizard.  

3.  The first stage is to define which method to use to add the 

computer: 

• 

automatically– based on data received by the Administration 

Server while polling the corporate Windows network. The com-
puter will be moved from the 

Network

 folder to the correspond-

ing group.

 

• 

manually– based on data entered by the administrator. The re-

liability and accuracy of the information will be verified to pre-

Summary of Contents for ADMINISTRATION KIT 6.0

Page 1: ...KASPERSKY LAB Kaspersky Administration Kit version 6 0 ReferenceBook...

Page 2: ...K A S P E R S K Y A D M I N I S T R A T I O N K I T V E R S I O N 6 0 Reference Book Kaspersky Lab Ltd Visit our website http www kaspersky com Revision date February 2006...

Page 3: ...16 2 2 2 Granting rights to groups 18 2 3 Viewing information about networks and IP subnetworks 20 2 3 1 Viewing information about the computer network 20 2 3 2 Method for displaying the computer netw...

Page 4: ...nistration Servers 59 2 8 1 Adding a new slave Administration Server 59 2 8 2 Configuring the connection of the slave server to the main server 61 CHAPTER 3 REMOTE APPLICATION MANAGEMENT 63 3 1 Config...

Page 5: ...2 14 Pausing resuming tasks manually 136 3 2 15 Monitoring task execution 136 3 2 16 Viewing results of the task execution stored on the Administration Server 137 3 2 17 Configuring the event filter f...

Page 6: ...3 3 Customizing event queries 163 5 3 4 Saving information about events to a file 167 5 3 5 Deleting events 167 5 4 Reports 167 5 4 1 Creating a report template 167 5 4 2 Viewing and editing report te...

Page 7: ...ackup copy of the Administration Server data manually The klbackup utility 198 5 9 4 2 Moving the Administration Server to a different computer 200 5 9 4 3 Moving the Administration Server database to...

Page 8: ...and from one centralized location monitor the observance of the license agreement that is that the number of applications operating in the network is less than or equal to the num ber of licenses and...

Page 9: ...e in the operation of applications about which he or she wants to be notified The list of such events may include for example the detection of a new virus an error that occurred while updating the ant...

Page 10: ...book Various formatting features and icons are used throughout this document depending on the purpose and the meaning of the text The table below lists the conventions used in the text Format feature...

Page 11: ...p is created only on the administrator s workstations when Administration Console is installed 2 1 2 Connecting to the Administration Server To connect to the Administration Server select the node cor...

Page 12: ...he Secure Sockets Layer protocol SSL Unselect this box if you do not want to communicate via SSL However this will lower the security of data transmissions against modification or interceptions Use da...

Page 13: ...e a new certificate will be displayed see Figure 2 Select one of the following I want to connect to the server and download the certificate from it select this option to connect to the Administration...

Page 14: ...a member of the logical network operators group KLOperators or of the administrators group KLAdmins try logging on under another account see Figure 3 In the corresponding form specify a user account...

Page 15: ...e of the server in the logical network on which you plan to work see above and if necessary check the Use SSL connection checkbox to enable secure connection If you have no logical network operator or...

Page 16: ...sponding item in the Action menu 2 2 Granting rights 2 2 1 Granting rights to use the Administration Servers To grant rights to users to work with the logical network of Administration Server 1 Select...

Page 17: ...rmissions All includes Reading Execution and Writing rights Reading o connecting to the Administration Server o viewing the logical network structure or administration group o viewing the values of ap...

Page 18: ...e functionality of Kaspersky Administration Kit To assign rights select the required group of users and check boxes next to the names of the permissions being granted If you wish to check all boxes ch...

Page 19: ...ion Server network To configure individual access rights for an administration group which are different from those specified in the Administration Server settings uncheck the Inherit box 3 Configure...

Page 20: ...and workgroups of the corporate Windows network Each of the folders at the lowest level contains a list of computers of the respective domain or workgroup which are not included in the structure of t...

Page 21: ...ect the New IP subnetwork command or use the corresponding item from the Action menu The New IP subnetwork command is available only when displaying the Network folder as IP subnetworks 2 In the New I...

Page 22: ...mand or use the corresponding item in the Action menu This will open the dialog window Properties Subnetwork name that includes the General and IP ranges tabs You can do the following in the General t...

Page 23: ...regular polling of the computers in this sub network by the Administration Server If you do not want the Administration Server to poll the subnetwork uncheck the Al low IP subnetwork scanning box Fig...

Page 24: ...9 specify the method to define the range and enter the values for the method selected Select one of these options Specify the IP subnetwork using the address and the sub network mask in this case you...

Page 25: ...ties on the popup menu or click the corresponding option on the Action menu This opens the Properties Active Directory Group Name dialog containing a General tab cf Figure 10 This tab can be used to s...

Page 26: ...ersky Administration Server Server Name node Either click Quick Start Wizard on the shortcut menu or on the Action menu 2 Initially the computer network is polled and computers within this network are...

Page 27: ...e Unassigned mode when logical network is created i e it is switched off or disconnected from the network the wizard will not add this computer to the logical network The computer can be added later w...

Page 28: ...n uses data stored on the main server in the configura tion file ncd dat This file is located in the folder NCD in the Kaspersky Administration Server installation folder If the Administration Server...

Page 29: ...tes a anti virus protection system for logical network clients using versions 5 0 and 6 0 of Kaspersky Anti Virus for Windows Workstations In this case the Administration Server creates a policy and d...

Page 30: ...olicy is called Download updates task and has default settings The task of copying backup data of the Administration Server is in the Global Tasks node of the console tree with the name Backup copying...

Page 31: ...147 Click Next The wizard window displays the process of creating the tasks and the policies If errors occur an error message will be displayed 6 Select in the next window of the wizard see Figure 15...

Page 32: ...older a list of objects included in this group will be displayed in the details panel You can also expand the corresponding branch of the console tree To view information about group policies select t...

Page 33: ...t a folder with the name of the required group in the Groups folder and then use either the Properties command from the shortcut menu or from the Action menu This will open the Group name Properties d...

Page 34: ...ked it will be automatically installed For the Unassigned group properties and its subgroups see Figure 29 the New client computer in the group section contains the checkbox Add computer to group If t...

Page 35: ...Directory group or IP subnetwork from which new computers will be moved Figure 17 Viewing group properties The Computers tab The Computer status tab specifies criteria for determining whether a clien...

Page 36: ...xample you can establish the maximum number of days during which the client computer has not connected to the Administration Server After this period of time is elapsed the computer is assigned Critic...

Page 37: ...ection 4 2 3 on page 151 2 5 3 Viewing information about the client computer To view information about a logical network client Select the group in the Groups folder that contains the desired client T...

Page 38: ...tion settings with the Administration Server by using the Do not disconnect from the Administration Server checkbox If the checkbox is checked the client server connec tion is permanent By default the...

Page 39: ...st virus scan Viruses found total number of viruses detected from the first scan until the virus counter was reset To reset the counter click Reset virus counter on the shortcut menu or on the Ac tion...

Page 40: ...configure its settings for details see section 3 1 1 2 on page 66 On the Tasks tab you can manage tasks for client computers view existing tasks delete and create new tasks start and stop them change...

Page 41: ...he main Administration Server select the Administration servers node in the folder of the required group 2 In the Administration servers node select the required slave Server and either select the Con...

Page 42: ...he setting is specified as modifiable in the slave Server policy it can be changed in the application settings see section 3 1 1 2 on page 66 or task settings see section 3 2 4 on page 124 the icon wi...

Page 43: ...configure group settings 1 Select the required group in the console tree or in the results pane and use the Properties command in the shortcut menu or the corresponding item in the Action menu 2 This...

Page 44: ...e Reset Virus Counter button to reset the counter for the viruses detected on all client computers in the group Figure 25 Configuring group settings The General tab The following settings can be confi...

Page 45: ...section speci fies how the Administration Server reacts to the inactivity of cli ent computers of this group o if you wish the logical network administrator to be notified after a period of inactivity...

Page 46: ...ling to the administration group Using the Select button specify the Active Directory group or the IP subnetwork from which new computers will be moved The Computer status tab see Figure 27 specifies...

Page 47: ...at the level of the parent group and are inherited by all groups in the logical network To establish individual criteria for a group uncheck the Inherit box and configure the settings For groups at th...

Page 48: ...n the computer hosting the Administration Console The lower part contains the list of possible permissions All includes Reading Execution and Writing rights Reading o connecting to the Administration...

Page 49: ...Agent and the Administra tion Console components o granting to users and groups of users access rights to the functionality of Kaspersky Administration Kit To assign rights select the required group...

Page 50: ...tically installed For all installation packages for which boxes are checked deployment group tasks with names like Installation Name of the selected installation package will be created You can run th...

Page 51: ...ng computers to the logical network To add a computer computers to the logical network 1 In the Group folder select the group folder to which you wish to add the client computer If you are adding a cl...

Page 52: ...s on the Windows network as the computer s address To import the list from a file specify a txt file with the list of addresses being added by the computer Each address must be located on a separate l...

Page 53: ...Delete or analogous items from the Action menu Computers deleted from the logical network will be moved to the Network group The moving operation can also be performed using the mouse 2 7 3 Moving a...

Page 54: ...elect Kaspersky Network Agent and Change Kaspersky Administration Server Task as the application and the task type respectively see Figure 30 Figure 30 Selecting the application to be installed 4 Duri...

Page 55: ...e new Administration Server specify the port number to be used for secure connection to the new Administration Server using the SSL protocol check the Use proxy server box if you are connecting to the...

Page 56: ...Settings tab see Figure 31 of the task property window details of the task settings configuration see section 3 2 4 on page 124 Figure 32 Viewing the Administration Server change task settings 5 If y...

Page 57: ...Network Agent this utility is located in the component s root installation folder and when run from the command line can perform the following actions depending on the command line parameters used co...

Page 58: ...st connection to the Administration Server silent launch the utility in non interactive mode This modifier can be useful for instance when launching the utility from the launch scenario when registeri...

Page 59: ...By default the information will be stored in file stdout tx If the modifier is not used the parameters results and error messages will be printed to the screen sp display the password used to authenti...

Page 60: ...the main server Specify the address of the main Administration Server You can use either its IP address or computer s name in the Windows network as the computer s address If a proxy server is used fo...

Page 61: ...he Properties Administration server computer name window that will open click the Server hierarchy settings hyperlink on the General tab 3 In the Master server settings window that will open check the...

Page 62: ...the slave Server now belongs After this you can connect to the slave Server via the main server from the Administration Server node Figure 33 Configuring the slave Administration Server s connection t...

Page 63: ...n menu to start a new policy wizard Follow the wizard s instructions 2 At this stage you must specify the policy name and the application for which this policy is being created Enter the policy name I...

Page 64: ...can be activated see section 3 1 1 4 on page 79 Mobile user policy This policy will be applied after you disconnect the computer from the corporate logical network This type of policy is available fo...

Page 65: ...he icon will change to Local application settings have a higher priority than policy settings For a policy to take effect on client computers you should lock certain parameters When creating a policy...

Page 66: ...s 3 1 1 2 Viewing and configuring policy settings To view group policy settings and or modify them In the console tree choose the required group and select the Policies folder in this group In the det...

Page 67: ...for ex ample Kaspersky Anti Virus 5 0 for Windows Workstations application version creation date and time date and time of last modification the Activate policy based on the event box and the list use...

Page 68: ...indicated by the icon will change To prevent users modifing mandatory settings on client computers left click the icon The icon will change to checked all application settings will be changed accordi...

Page 69: ...voked only parameters editable under the policy i e those marked with will revert to their original values Modify all Parameters when Policy is First Applied This would cause all local parameters to a...

Page 70: ...ails button The Details dialog box displays a table that has the following columns Computer client name Domain name of the domain to which the client belongs Status the policy status which may have on...

Page 71: ...application related events what type of events to record how to notify the administrator or other users upon virus protection related events and where to store event logs Figure 41 Editing a policy T...

Page 72: ...has changed Rules for handling events are defined for each level of severity 1 From the drop down list select the severity level Critical Error Warning or Info 2 Events corresponding to the selected...

Page 73: ...er the notification recipient s email address in the Re cipient Address field Several addresses can be entered as a list separated by commas or semi colons o Enter the email server address in the SMTP...

Page 74: ...ET SEND cf Figure 44 Under this option use the field be low to enter recipient host addresses for network notifications An IP address or a Windows network name may be used Sev eral addresses may be en...

Page 75: ...igure 44 At the bottom of the tab enter the message which will be delivered as notification If the Use Administration Server Settings checkbox is checked the message text specified on the Administrati...

Page 76: ...n this tab by clicking the Test button This will cause a test notification send window to open cf Figure 46 In the event of errors detailed error information will be displayed Figure 46 Configuring no...

Page 77: ...inistrator workstation The events are logged in the Events node of the console tree check the Store events locally checkbox to save events locally on each client In this case you can only view event l...

Page 78: ...1 1 3 Displaying Inherited Policy in Nested Group Result Panel To have inherited policies display in a nested group under the Policies folder 1 Select the Policies folder in a nested group s result pa...

Page 79: ...based on an event To activate a group policy automatically when a certain event occurs 1 Select the required group in the results panel and either select the Properties command from the context menu o...

Page 80: ...e application group policy settings window that will open 3 Select the Policy for a mobile user item from the drop down list in the Policy status field 4 Press the Apply or button Following activation...

Page 81: ...ing the Network Agent s policy When creating a policy for the Network Agent in the Settings window see Figure 48 you can specify the following settings in the Event log field specify the maximum file...

Page 82: ...he time in terval in minutes between attempts to synchronize data of the client computers and the Administration Server check the Use SSL connection box if you wish the connection to be secure using S...

Page 83: ...the in built firewall will block UDP port 15000 To access the Administration Server you will have to open this port manually Figure 49 Creating policy for the Network Agent The Network window When ed...

Page 84: ...dministration Agent Ports in Windows Firewall This will cause the UDP port required to support Administration Agent to be added to the Microsoft Windows firewall exception list Figure 50 Creating poli...

Page 85: ...ttings window see Figure 52 specify the following In the Connection settings for the Administration Server field the number of the port used to connect to the Administration Server The default value i...

Page 86: ...able automatic network polling check the Allow scan box in the Windows network group To enable automatic polling of IP subnetworks check the Allow scan box in the IP subnets group The Administration S...

Page 87: ...cy parameters may be modified Use the Host visibility time out mins field on the Settings tab to specify the time during which the client computer will be considered visible to the network after the c...

Page 88: ...s network polling intervals Full scan time min additional information on computers is re quested including Operating System IP address and DNS name The default polling frequency is 60 minutes Quick sc...

Page 89: ...identical to those in the like named tab under Administration Server properties The Cisco NAC tab may be used to define a mapping between antivirus protection conditions and Cisco NAC statuses The set...

Page 90: ...a list of all policies existing for this group Select a policy and click Export on the shortcut menu or on the Action menu In the window that opens specify the name of the file where the policy will...

Page 91: ...applications installed on this computer and displays general information about them If the client computer is an administrator workstation and or a Administration Server the list contains the Kaspersk...

Page 92: ...n The tabs are specific to each application For more information about the tabs see the corresponding user documentation The General Licenses and Event processing tabs are common for all applications...

Page 93: ...talled on a client computer In the Current license key field you can view data on the current license key Number the license key serial number Type type of the installed key for example commercial or...

Page 94: ...od license validity period Limit computer count the license restrictions imposed by the key Figure 59 Application properties dialog box The Licenses tab The Event severity tab displays rules for handl...

Page 95: ...settings in the console tree select the Kaspersky Administration Server Server name node that corresponds to the required Administration Server Click Properties either on the shortcut menu or in the...

Page 96: ...he installed application path of the public access folder used for storing application de ployment files and the updates downloaded to the Administra tion Server Figure 61 Viewing the Administration S...

Page 97: ...pplication version Information about the manufacturer Kaspersky Lab and copyright information Date and time of plug in creation Figure 62 Viewing application plug in properties The Application plug in...

Page 98: ...rties of the selected slave server In this dialog box you can Specify whether this Administration Server is a slave server Specify the address and port of the master Administration Server Specify or m...

Page 99: ...The default port number is 14000 If this port is already in use you can change it SSL port number displays the SSL port number used to se curely connect to the Administration Server The default port i...

Page 100: ...om the Administration Server The default value is 120 minutes After the specified time has elapsed the Administration Server will consider the client computer inactive Figure 65 Viewing Administration...

Page 101: ...k of virus attacks increases o Host is out of control unable to establish connection with the Network Agent installed on the client computer o Host status is Critical a computer with settings matching...

Page 102: ...r of licenses in use is over 90 of the maximum number supported by this license key o New host found a new client has been found during network browsing o The host was automatically added to group a n...

Page 103: ...policies for applications as default settings Settings on this tab match the policy settings Specify email notification parameters o Enter the notification recipient s e mail address in the Re cipient...

Page 104: ...or semicolons Figure 67 Viewing Administration Server properties The Notification tab Run Executable group use the Browse button to select an executable to run when an event is triggered Executable e...

Page 105: ...nd configure appropriate values in the resulting window cf Figure 43 To reduce the impact on the Server s resource usage limit the number of notifications sent by the Administration Server by clicking...

Page 106: ...tected viruses during a specified time interval If the number of viruses detected for a short period exceeds the threshold the event is classified as a Virus outbreak This parameter allows the adminis...

Page 107: ...polling by the Administration Server The Windows network group of fields is used to configure the general network polling settings To enable automatic network polling check the Allow scan box Specify...

Page 108: ...hin the range Polls occur with the frequency specified in the Scan period mins field By default the polling interval is 420 minutes You can specify a different value or cancel polling by unchecking th...

Page 109: ...en integrated with Cisco NAC the Administration Server acts as a standard Posture Validation Server PVS component which an administrator may use to either allow a computer to access or prevent it acce...

Page 110: ...lts pane and select the Properties command on the shortcut menu or use the analogous item from the Action menu 2 Switch to the Applications tab in the window that opens 3 In the list of applications i...

Page 111: ...Remote Application Management 111 Figure 74 The Network Agent settings window The Settings tab...

Page 112: ...to configure settings for connecting the Agent to the Administration Server these settings are hardwired which is possible because these components are installed on the same computer 3 2 Managing appl...

Page 113: ...the list which displays all Kaspersky Lab applications that have Console Plug ins installed on the administrator workstation Select the type of the task from the Choose type of task for execution list...

Page 114: ...tart start the task at application startup o Manually start the task manually from the Kaspersky Administration Kit main window by clicking the Start command on the shortcut menu or on the Action menu...

Page 115: ...ncy value is set at 6 and the default start date and time for the task is set to the current system date and time of your computer o The procedure for the task to start if the client computer is unava...

Page 116: ...If you set up the task to start Daily Figure 79 specify the following o The frequency of task startups in the Every field and the start time in the Schedule to run field For example if the Every days...

Page 117: ...time in the Schedule to run field By default the task will start on Sunday 18 00 00 You can change the default time if necessary For example if the value of the Every field is Sunday and the value of...

Page 118: ...task For example if the value of the Every day of month field is 20 and the value of the Schedule to run field is 3 00 00 AM the task will start on the 20th of every month at 3 p m The default value i...

Page 119: ...of the task launch in the Run on field and the launch time in the Schedule to run field The values of these fields are set automatically and correspond to the current system date and time You can cha...

Page 120: ...start Manually Figure 83 At application start or Immediately after a task is created specify o Actions to take if a client is temporarily unavailable at task start cf description above o Randomized sc...

Page 121: ...ted task in the Exit Code field Completed Successfully or Error o Actions to take if a client is temporarily unavailable at task start see above Figure 84 Task start following completion of another ta...

Page 122: ...necessary you can configure task settings see section 3 2 4 on page 124 3 2 2 Creating a global task To create a global task In the console tree select the Tasks node and click the New Task command o...

Page 123: ...ould either create a new task or make appropriate changes to the current task settings After the wizard completes the global task you created will be added to the Tasks node in the console tree and di...

Page 124: ...mentation for the corresponding applications 3 2 4 Viewing and changing task settings To view and or change task settings to create modify a group task choose a target group in the console tree and se...

Page 125: ...s The group policy settings for global tasks are not shown You can view the actual settings for this task in the Computer name Properties dialog box on the Tasks tab Figure 87 The General tab Figure 8...

Page 126: ...op Pause and Resume You can temporarily remove the task from the list of scheduled tasks To do this uncheck the Run at Scheduled Time checkbox Though the task will not be deleted it will not be launch...

Page 127: ...iate ac cess rights For example for on demand scans the account should have access rights to the scanned object for update tasks the account should be able to access the shared folder on the Administr...

Page 128: ...2 8 on page 133 The content of the Schedule tab and its operation are analogous to those available in the schedule settings configuration window that opens when you create a task see section 3 2 1 on...

Page 129: ...ients cen trally in Administration Server Windows event log Use the same field to specify which events are to be logged o Log All o Log Task Progress o Log Execution Result Only In the Notify administ...

Page 130: ...ing task settings The Notification tab The global task properties dialog box has the Target computers tab see Figure 93 which has a list of logical network clients on which the selected task is runnin...

Page 131: ...olicies in a nested group under the Group Tasks folder 1 Select the Group Task folder in a nested group result pane 2 Open a popup menu select Type and check Inherited Tasks This will cause inherited...

Page 132: ...open check the Activate computer before the task is launched by function Wake On LAN min box and indicate the required time As the result the operating system of the computer will startup before the t...

Page 133: ...figuring window see Figure 88 uncheck the Schedule box As a result the task will remain in the list but will not be launched according to the schedule 3 2 10 Creating application start stop task To st...

Page 134: ...134 Kaspersky Administration Kit Figure 95 Start stop application task Task settings dialog box Figure 96 Editing the Start stop application task...

Page 135: ...where the task will be saved and its location Click Save 3 2 12 Importing a task To import a task from a file In the console tree select the required group Open the shortcut menu of the Tasks folder...

Page 136: ...ttings window for the task you need see section 3 2 4 on page 124 and switch to the General tab see Figure The following information will be displayed in the lower part of the tab Pending number of co...

Page 137: ...following information will be displayed Host name of the client computer on which the task is de fined Group the name of the administration group that contains the client computer Status the current t...

Page 138: ...Computer name Properties dialog box using the History button on the Tasks tab see below You will see information stored on the Administration Server If task history is stored locally on a workstation...

Page 139: ...the Task execution results field To restrict the amount of information to be displayed after the filter has been applied check the Restrict the number of dis played events box and indicate the maximum...

Page 140: ...ers tab 4 Define the event and task execution registration time on the Time tab see Figure 102 You can select the following options During a period and define fixed dates for the beginning and end of...

Page 141: ...results window 3 2 18 Configuring event filter for a selected computer To configure filter for the information displayed in the Task execution results window 1 Select Filter from the shortcut menu Th...

Page 142: ...a specific type check the Events box and check boxes next to the names of the required types If the event type is not specified all types of events will be displayed To ensure that the task execution...

Page 143: ...3 2 17 on page 138 The Computer tab is not provided as the filter is configured for a selected computer only 3 To confirm the changes press the OK button The filter means that only information that sa...

Page 144: ...obal task see section 3 2 2 on page 122 To create the downloading updates task select Kaspersky Administration Kit as the application for which you want to create the task and the Download updates tas...

Page 145: ...rce to the list press the Add button and select one of the following options in the Updates source properties window that will open see Figure 104 Kaspersky Lab s update servers for receiving updates...

Page 146: ...the parameters in the window that opens see Figure 105 If you connect to the updates server via a proxy server check the Use proxy server box and enter the address and the port number to be used to co...

Page 147: ...ask On the Settings tab you can change update task settings as follows Define the contents of the updates to be downloaded from an update source in the Update sources group of fields see section 4 1 1...

Page 148: ...of the task for receiving updates by slave Administration Servers using the Force update of slave servers box view the location of the folder containing the updates received from the source in the Lo...

Page 149: ...dministration Server will be displayed in the results pane 4 1 4 Viewing properties of the downloaded updates To view update properties Select the required update in the details panel and click Proper...

Page 150: ...or application modules updates Name and version of the application to which the update ap plies Size of the update saved on the Administration Server Date when the update was copied to the Administrat...

Page 151: ...y after they are received in the settings of the Administration Server s receiving updates task check the Force updating of slave servers box As the result immediately after the updates are received b...

Page 152: ...lt value is 14000 If the host running the Administration Server is specified as the Update Agent port 14001 is used by default specify the number of the port via which the client computer will be secu...

Page 153: ...ill the fields Multicast IP and Port Number IP MULTICAST Port number For details on the distribution of installation packages using updating agents see the Implemen tation guide To view update agent s...

Page 154: ...type the type of the license key installed for example commercial trial Restrictions license restrictions imposed by the key License period the validity period of the license key 5 1 2 Viewing license...

Page 155: ...Targets tab contains the list of client computers on which this license key is installed The tab contains the following information name of the client computers administration group whether or not th...

Page 156: ...al task see section 3 2 1 When creating this task Specify the application for which you are installing this license key as the application for which the task is being created specify License key insta...

Page 157: ...ogous item under the Action menu This will launch a global task creation wizard this wizard will miss the step which selects the task type as the task type will be selected by default Tasks created us...

Page 158: ...the logical network use a built in template License key report or create a new template of the same type see section 5 4 1 on page 167 The report is created based upon the License key report template...

Page 159: ...ns will contain the following information about the object name under which the object was delivered for processing by the anti virus application object description action that was performed on the ob...

Page 160: ...e results pane and use the Delete command from the shortcut menu or the analogous item in the Action menu The anti virus application that quarantined this object or placed it into backup storage on th...

Page 161: ...er scan task will be launched on the client computer for the anti virus application that quarantined the selected object 5 3 Event logs Event queries 5 3 1 Viewing Kaspersky Administration Kit event l...

Page 162: ...in either ascending or descending order change the order of columns or add and remove columns To facilitate viewing and searching for required information there is a provision for creating and config...

Page 163: ...es command from the shortcut menu or the analogous item in the Action menu 2 This will open the query configuration window that contains the tabs General Events Computers and Time On the General tab y...

Page 164: ...in To obtain information only about results of the last task launch check the Show only last results of the task box To restrict the amount of information to be displayed in the query check the Restri...

Page 165: ...in specify the range of IP addresses of computers by checking the Range of IP addresses box and enter the start and end IP address Figure 119 Configuring events query The Computers tab Specify time fo...

Page 166: ...the period To do this select Events for the date in the field groups from and until and specify the exact date and time If all registered information is required select the First Event and the Last ev...

Page 167: ...nly box 3 During the second step select the file format Export as a text divided by tabulation marks text file Export as UNICODE text divided by tabulation marks UNICODE format text file 4 To close th...

Page 168: ...the For recent days option and specify the number of days in the field on the right This step is not required for reports reflecting the current state for example for reports on the current anti virus...

Page 169: ...122 Creating a report template Selecting objects to be reported 6 Specify the group or select specific clients from different groups for which you want to create a report and close the wizard Figure 1...

Page 170: ...Properties dialog box see Figure 124 The tabs in this dialog box are specific to each report type The General tab contains general information about the template On this tab you can change the name of...

Page 171: ...field table together with the record sorting order and filter settings To create the list of fields use the Add and Delete buttons The field order may be changed with the Move Up and Move Down button...

Page 172: ...172 Kaspersky Administration Kit Figure 125 The report template settings window The Details fields tab...

Page 173: ...sorting On the Summary fields tab see Figure 127 fields that form a table with summary data included in the report are defined as well as the sort order of the records pertinent to these fields Setti...

Page 174: ...y fields tab The Totals tab see Figure 128 contains calculated fields of the report To delete an object from the report template select it in the Details fields list and press the Remove button To add...

Page 175: ...n the corresponding window see Figure 123 in the report template creation wizard Click the Apply or OK button to apply the settings 5 4 3 Generating and viewing reports To generate a report using a te...

Page 176: ...ing items Company logo the type and name of the report report brief de scription and reporting period and information about the objects for which this report was created Summarized data calculated sum...

Page 177: ...port template in the Reports node on the master Administration Server In the shortcut menu click the Properties item and on the General tab set the following parameters check Include data from slave K...

Page 178: ...tatus Using System Registry Data To view client antivirus protection status using data written to the system registry by the Administration Agent 1 Open client s system registry for example locally by...

Page 179: ...aximum protection 6 Enabled low level of protection maximum response speed 7 Enabled recommended settings 8 Enabled user defined settings Protection_RtpState REG_DWORD 9 Failed Protection_LastFscan RE...

Page 180: ...y search criteria in the following tabs Network Application Computer status Virus protection and External application Using the Network tab see Figure 131 you can specify the following search criteria...

Page 181: ...value from the drop down list The list contains names of only those applications for which management plug ins are installed on the administrator s workstation Application version specify the version...

Page 182: ...ng search criteria Computer status select the current computer status from the list OK Critical or Warning Computer status description check boxes next to the con ditions on which the selected status...

Page 183: ...he Virus protection tab see Figure 134 you can specify the following search criteria Anti virus database date indicate the anti virus database re lease date Anti virus database records range Last full...

Page 184: ...to use information about computers stored on the slave Administration Servers check the Use data from the slave servers up to level box and specify the maximum nesting level to be included in the sear...

Page 185: ...puters The External application tab 5 6 2 Saving computer search results in a text file To save the search results into a text file press the Export to file button in the Find computers window see Fig...

Page 186: ...r in the console tree To add computers to the query configure the query parameters Figure 136 Configuring a computer query 5 7 2 Configuring a computer query To configure a computer query 1 Select the...

Page 187: ...uded in the logical network To perform a search which includes information about computers stored on the slave Administration Servers check the Use data from the slave servers up to level box After th...

Page 188: ...the time when new computers appear in the network to do this check the New computers detected during the network poll ing and specify period in days in the Period of detection days field Figure 138 C...

Page 189: ...rotection on the computers which will be included in the query on the Virus protection tab You can specify date of the creation of the anti virus database used by the ap plications to do so check the...

Page 190: ...Anti virus protection tab On the Computer status tab see Figure 141 specify parameters that characterize the status of the computers and the status of the real time protection performed on computers...

Page 191: ...e anti virus database and program modules 191 Figure 141 Configuring a computer query The Computer status tab On the External application see Figure 141 specify the external application installed on t...

Page 192: ...tack detection mechanism To ensure that the Virus attack event is registered in the logical network and that the notification of this event is issued 1 In the console tree select the node correspondin...

Page 193: ...Worm Trojan and Malware event type and check the Save on Administration server for days checkbox under event properties on the Logging tab The Virus attack event cannot be created more than once in 24...

Page 194: ...Administration Server component it is located in the root of the installation folder 5 9 2 Restoring the Administration Server data from a backup copy To restore the Administration Server data run the...

Page 195: ...inistration sever Figure 143 Creating a backup data copying task Selecting application and task type Specify on this step of settings configuration see Figure 144 o the backup storage folder for savin...

Page 196: ...Administration Sever policy tasks application settings events saved on the Administra tion Server o configuration information about the structure of the logical network and client computers o storage...

Page 197: ...nd or use the analogous item in the Action menu 2 In the window that opens select the Settings tab see Figure 145 This tab displays the same settings that were determined when the task was created fol...

Page 198: ...opying utility 5 9 4 1 Creating a backup copy of the Administration Server data manually The klbackup utility To create a backup copy of the Administration Server data manually start the klbackup util...

Page 199: ...ifier is specified information will be saved into the root of the BACKUP_PATH folder When attempting to save information into the folder in which a backup copy already exists an error message will app...

Page 200: ...t computer 1 Create a backup copy of the Administration Server data 2 Install a new Administration Server To simplify moving the logical network it is desirable that the new server s address matches t...

Page 201: ...o simplify moving the logical network it is desirable that the new server s address matches the old server s address Address computer s name in the Windows network or IP address must be indicated in t...

Page 202: ...ption or a similar option under the Action menu This will open the Properties Administration Server Name dialog 2 Select the Cisco NAC tab cf Figure 72 3 In the upper field select a Cisco NAC status H...

Page 203: ...t your order if you purchased the product via the internet To send a message about problems with the application operation to the Techni cal Support Service open the Kaspersky Lab s website www kasper...

Page 204: ...node Enter your e mail address in the E mail address field Press the Next button Provide the following information in the next window Indicate your contact details in the Contact information section...

Page 205: ...on system based on Kaspersky Lab applications Administration Server A Kaspersky Administration Kit component that centrally stores information about Kaspersky Lab applications installed on clients and...

Page 206: ...e specific to each application and are included in all Kaspersky Lab applications that can be managed through Kaspersky Administration Kit Centrally managing an application Managing an application thr...

Page 207: ...ndividual applications The policy involves configuration of all parameters of applications I IChecker technology A technology that excludes the objects from future scans that remained unmodified since...

Page 208: ...he license period defined by the license key is one year from the date of purchase After your license expires the application functionality will be restricted Local network administrator A user who in...

Page 209: ...efore enabling access to an object Kaspersky Anti Virus scans it for viruses and if a virus is detected blocks access to the object disinfects it or deletes it depending on user defined settings Recom...

Page 210: ...rtup Some viruses attempt to infect the startup objects and can cause startup failure Suspicious object An object that contains either a modified code of a well known virus or a code reminiscent of a...

Page 211: ...ld number of viruses detected for a specified time interval When this number is exceeded the situation is regarded as a Virus outbreak virus attack This parameter is important for defining virus epide...

Page 212: ...protection from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step ah...

Page 213: ...y Kaspersky Lab Ltd Kaspersky OnLine Scanner This program is a free service provided to the visitors of Kaspersky Lab s corporate website The service delivers an efficient online anti virus scan of yo...

Page 214: ...stem The program allows users to create a list of applications which it will control on a per component basis It helps protect application integrity against the influence of mali cious software Monito...

Page 215: ...ges to the file system and registry and restores the system after ma licious influence Protection against Internet fraud is ensured by recognition of phishing attacks thereby preventing confidential d...

Page 216: ...omatically scanned as well as files when attempts are made to access them Protection from text message spam Kaspersky Anti Virus for File Servers This software package provides reliable protection for...

Page 217: ...ty is a software package withal new approach to security for today s corporate networks of any size providing centralized protection information systems and support for remote offices and mobile users...

Page 218: ...Management Intel vPro Kaspersky Business Space Security provides optimal protection of your company s information resources from today s Internet threats Kaspersky Business Space Security protects wor...

Page 219: ...vers Scanning of all e mails on Microsoft Exchange Server including shared folders Processing of e mails databases and other objects for Lotus Domino servers Protection from phishing attacks and junk...

Page 220: ...ams whose signatures are not yet added to the database Protection of mail servers and linked servers Scans Internet traffic HTTP FTP entering the local area network in real time scalability of the sof...

Page 221: ...a dedicated e mail gateway The solution includes Kaspersky Administration Kit Kaspersky Mail Gateway Kaspersky Anti Virus for Lotus Notes Domino Kaspersky Anti Virus for Microsoft Exchange Kaspersky A...

Page 222: ...list object types and user groups Quarantines suspicious objects Easy to use administration system Reporting system for program operation Support for hardware proxy servers Scalability of the software...

Page 223: ...per for Exchange Clearswift MIMEsweeper for Web The program is a plug in and scans for viruses and processes inbound and outbound e mail traffic in real time C 2 Contact Us If you have any questions c...

Page 224: ...OU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE WITH THE LEGISLATION REGARDING KASPERSKY SOFTWARE INTENDED FOR IN...

Page 225: ...spersky Lab s update servers 1 1 3 If you sell the computer on which the Software is installed you will ensure that all copies of the Software have been previously deleted 1 1 4 You shall not decompil...

Page 226: ...d or obtaining of the End User identifier Customer ID technical support service renders only assistance in Software activation and registration of the End User ii By completion of the Support Services...

Page 227: ...hased on a physical medium will perform substantially in accordance with the functionality described in the Documentation when operated properly and in the manner specified in the Documentation ii You...

Page 228: ...excluded by law ii Subject to paragraph i above Kaspersky Lab shall bear no liability whether in contract tort restitution or otherwise for any of the following losses or damage whether such losses or...

Page 229: ...from the Effective Date ________________________________________________________________ When using demo software you are not entitled to the Technical Support specified in Clause 2 of this EULA nor d...

Reviews: