background image

 

KASPERSKY LAB 

Kaspersky Security

®

 5.5  

for Microsoft Exchange Server 

2003 

ADMINISTRATOR'S 
GUIDE 

Summary of Contents for SECURITY 5.5 - FOR MICROSOFT EXCHANGE SERVER...

Page 1: ...KASPERSKY LAB Kaspersky Security 5 5 for Microsoft Exchange Server 2003 ADMINISTRATOR S GUIDE...

Page 2: ...K A S P E R S K Y S E C U R I T Y 5 5 F O R M I C R O S O F T E X C H A N G E S E R V E R 2 0 0 3 Administrator s Guide Kaspersky Lab http www kaspersky com Revision date November 2006...

Page 3: ...peration on a cluster of servers 18 CHAPTER 3 INSTALLING UPDATING AND REMOVING THE APPLICATION 20 3 1 Installing the application 20 3 1 1 First time installation 21 3 1 2 Reinstalling the application...

Page 4: ...3 Scanning attachments 53 6 4 Scanning of routed e mail traffic 56 6 5 Selecting actions to be performed with objects 57 6 6 Background scan 62 CHAPTER 7 ANTI SPAM PROTECTION 65 7 1 Enabling disabling...

Page 5: ...uring log settings 114 CHAPTER 14 LICENSE KEYS 115 14 1 License information 117 14 2 Installing the license key 119 14 3 Removing a license key 121 14 4 License related notifications 121 14 5 Unprotec...

Page 6: ...tings 145 15 2 1 Reviewing the information about application 147 15 2 2 Reviewing the license key information 148 15 2 3 Start background scan 148 15 2 4 Selection of protected storage 149 15 2 5 View...

Page 7: ...il servers fill mailboxes with unwanted messages cause the loss of working time and inflict serious financial losses Additionally it is to be noted that the newest malicious programs use the so called...

Page 8: ...they do not infect other programs or data Trojans are not capable of independently penetrating computers Their users spread them under the guise of useful software The damage that they incur can excee...

Page 9: ...er to compile a list of the software installed on the computer gather information on the quality of the connection bandwidth modem speed etc Jokes Software that does not do any direct damage but displ...

Page 10: ...pam can be roughly divided into four categories Formal messages messages that are automatically generated and sent to recipients by automated mail program functions as for example notifications of und...

Page 11: ...e application allows generation of reports using templates with a preset level of detail and at a required interval detecting virus outbreaks as they emerge and notifying about such events The applica...

Page 12: ...and other service folders 1 4 Software system requirements Requirements to protected server Microsoft Windows Server 2000 with Service Pack 4 installed or higher Microsoft Windows 2000 Advanced Server...

Page 13: ...at the envelope with the installation CD remained sealed By opening the envelope containing the installation CD or by installing the product on your computer you accept all terms and conditions of the...

Page 14: ...ns used in the text Format feature Meaning Usage Bold font Titles of menus menu items windows dialog boxes and their elements etc Note Additional information notes Attention Information requiring spec...

Page 15: ...the server and the content of all public folders are scanned each time the anti virus database is updated or according to the schedule The scan may identify new viruses that were not described in the...

Page 16: ...Microsoft Exchange Server via SMTP protocol and forwards them to the anti spam scan subsystem Anti spam Scan Subsystem scans e mail messages for spam This feature is implemented as a Microsoft Windows...

Page 17: ...is not installed the applica tion will function within the default limitations and using the default settings see section 4 6 page 33 The server protection against malicious programs and SPAM will be...

Page 18: ...f servers Kaspersky Security 5 5 for Microsoft Exchange Server 2003 does not fully support the cluster technology however it will function correctly on a cluster of servers treating each node as a sep...

Page 19: ...0 When adding managed servers and configuring connection of Management Console to the Server use the names of physical servers on which the Security Server is installed The use of a virtual Exchange s...

Page 20: ...tion components of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Security Server and Management Console This configuration is recommended at the initial stage of creating the Exchange serv...

Page 21: ...r Microsoft Exchange Server 2003 If Microsoft Exchange Server is not installed on your computer or if its version does not meet the software requirements a warning will be displayed on your screen In...

Page 22: ...nditions contained therein to proceed with the installation Step 4 Selecting the type of the installation In the dialog for setup type selection specify whether both application components Security Se...

Page 23: ...nstallation Step 6 Enabling server protection In the Server protection window you will be offered to enable automatically the anti virus protection and server protection against spam immediately after...

Page 24: ...personal key that contains all service information required for the full featured functionality of the application namely support information who is providing support and how you can get help restrict...

Page 25: ...you to confirm stopping the Microsoft Exchange Information Store and the Microsoft Internet Information services Agree to stop these services to let the uninstallation process complete its work corre...

Page 26: ...Microsoft Windows menu This programs group is cre ated only on the administrator s workstations when the Management Con sole is installed 4 2 Application interface The user interface of the applicatio...

Page 27: ...ral settings used for viewing general application s operation settings license details and information about installed license keys renewing the license and configuring the application operation diagn...

Page 28: ...about detected outbreaks 4 2 2 Shortcut menu Each category of objects in the console tree has its own shortcut menu that opens after right clicking an object with the mouse In addition to standard MMC...

Page 29: ...for creating reports Virus outbreak counters New counter Create and configure a new criterion to be used for identifying a virus outbreak and settings to be used for notification about such outbreak A...

Page 30: ...5 5 for Microsoft Exchange Server 2003 node in the console tree open the shortcut menu and select the Add server command or a similar item from the Action menu This will open the Add server window see...

Page 31: ...include nested folders Notification templates Backup storage Report templates and Virus outbreak counters If the connection has not been established or could not be established you can connect to suc...

Page 32: ...o it In this case working with the same server from several consoles you should regularly update information on each console In order to do this use the Refresh command available via the shortcut menu...

Page 33: ...the object and if disinfection is impossible the application deletes the object and replaces it with a text file containing a notification in the following format Malicious object VIRUS_NAME has been...

Page 34: ...or messaged that do not contain SPAM are detected these messages will be delivered intact to the Inbox of the user s e mail client when a suspicious message which possibly contains SPAM or message con...

Page 35: ...the EICAR organization at http www eicar org anti_virus_test_file htm If you have no Internet connection you can create your own test virus To create a test virus type the following string in any text...

Page 36: ...umn lists prefixes to be added at the beginning of the string of the standard test virus for example DELE X5O P AP 4 PZX54 P 7CC 7 EICAR STANDARD ANTIVIRUS TEST FILE H H After adding a prefix to the t...

Page 37: ...lication 37 When such message arrives at Exchange Server Kaspersky Security will assign it SPAM status and will process it applying the action specified for this type of objects by the administrator s...

Page 38: ...important to keep you databases up to date We recom mend that you update your databases immediately after your application is installed because the databases included into the distribution kit will b...

Page 39: ...ee section 5 2 page 40 specify the updates source see section 5 3 page 41 configure the network connection settings see section 5 2 page 40 You can setup different updates parameters for the anti viru...

Page 40: ...n The application will launch the updating process using the selected settings 5 2 Automatic updates In order to update the database in the automatic mode 1 In the main application window select the K...

Page 41: ...rent modes for updating the anti virus and the content filtration databases In order to do this check the Allow different anti virus and anti spam settings box This will divide the schedule setup wind...

Page 42: ...n the Updates window that will open see Figure 6 and specify the updates source required Updates servers of Kaspersky Lab Kaspersky Lab s HTTP and FTP internet servers where new updates are uploaded e...

Page 43: ...crosoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and follow the Updates link in the results pane 2 Switch to the Network Settings tab...

Page 44: ...e Connection timeout sec field If the connection was not established within the specified time limit the application will attempt to establish connection to the next update server until the connection...

Page 45: ...xy server You can use this feature to run updates with another profile that has those rights To configure an update to start under a different user profile 1 In the main program window select Kaspersk...

Page 46: ...46 Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Figure 8 Configuring update settings The Startup options tab...

Page 47: ...and the E mail Interceptor analyzes the mail traffic received from the Exchange server and transfers it to the Anti Virus Scan Subsystem The Anti Virus Scan Subsystem processes e mail messages based...

Page 48: ...ched files of any format It is to be noted that Kaspersky Security differentiates between simple objects an executable file a message with a simple attachment and containers consisting of several obje...

Page 49: ...ts through the mail server All currently known malicious programs Programs that do not contain malicious code as it is commonly under stood but may impose a moral threat inflict financial damage or fa...

Page 50: ...legal software that may work in a way that can be viewed by the application as a behavior characteristic of malicious or potentially dangerous software Examples of such software are backdoor and remo...

Page 51: ...d storage scan will be performed In order to enable or disable the anti virus protection or change anti virus protection level 1 Select the node corresponding to the server you need in the console tre...

Page 52: ...ore the default settings by pressing the Restore the default settings button In order to apply the changes press the Apply or the OK button The anti virus protection will then be enabled or disabled i...

Page 53: ...us mail protection using the Management Console see above 3 Enable the anti spam server protection using the Management Console see section 7 1 page 66 6 3 Scanning attachments In order to decrease th...

Page 54: ...ield to the right Since archives are one of the types of containers the restric tions applied to the scan of archives and containers are inter related If you impose a restriction to the scan of contai...

Page 55: ...o tx all files with mask tx o test all files with name test Figure 11 Specifying the masks for files to be excluded from the scan scope Files defined by type Using the Append and Remove buttons creat...

Page 56: ...ed and follow the Anti virus protection link in the results pane 2 Go to the Protected Mail see Figure 13 tab in the Anti virus protection window that will open 3 Check the Do not scan routed mail box...

Page 57: ...ach object can be assigned a status as listed below Not infected object does not contain viruses Infected object contains at least one of the known viruses Suspicious object s code is similar to the c...

Page 58: ...e name change affects attached objects only if a virus was detected in the message body no renaming is performed Replace infected objects with text delete the detected object and replace it with text...

Page 59: ...made no changes You must save the message In order to define the rules for processing objects detected during an anti virus scan 1 Select the node corresponding to the server you need in the console t...

Page 60: ...values A detailed description of the option selected in the table is provided in the bottom part of the window The further steps will depend on the selection you have made In order to continue using t...

Page 61: ...pied to the message body and into the replacement txt file Create a replacement template In order to do this enter the mes sage text into the wizard window The text of this notification may include in...

Page 62: ...plication scans the body of the message and attached files in accordance with the general settings of the anti virus scan If background storage scan is disabled e mail messaged stored on the server wi...

Page 63: ...ked by default and specify the desired scan launch option Every time the anti virus database is updated launch the scan every time the anti virus database is updated According to schedule launch the s...

Page 64: ...e scan immediately press the Start now button Figure 18 4 You can restrict the scan time In order to do this check the Stop scan in NN hours box and specify the desired time period in hours After this...

Page 65: ...ge attributes the sender s and the recipient s addresses message size headers including the From and the To headers Secondly anti spam content filtration is used to analyze the content of the message...

Page 66: ...n 7 2 page 67 7 1 Enabling disabling anti spam protection In order to enable disable anti spam protection 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Serv...

Page 67: ...2003 start function manually through Manage computer Services see section 6 2 page 51 7 2 Selecting the action to be performed with the message In order to select an action to be performed with a mes...

Page 68: ...t are carried out after the action Move to the Junk E mail folder For example if the rule requires automatic deletion of all messages from the Junk E mail folder then the message will be deleted No co...

Page 69: ...e see Chapter 6 page 47 If necessary you can restore the message from the backup storage or forward it to recipients unchanged If you do not want copies to be saved uncheck the Save a copy of the orig...

Page 70: ...to do this enter the appropriate values in the TCIP IP settings section in the Advanced tab of the Anti Spam protection window see Figure 23 Figure 23 Configuring anti spam protection settings The Ad...

Page 71: ...bal Settings node select Message Delivery and select Properties from the context menu 3 In the window that opens select the Connection filtering tab You can read more about creating configuring and ap...

Page 72: ...e open it select the node corresponding to the server you need and follow the Anti virus protection link in the results pane 2 Go to the Additional settings tab in the Anti virus protection window see...

Page 73: ...the node corresponding to the server you need and follow the Anti Spam protection link in the results pane 2 Go to the Advanced tab in the Anti Spam protection window see Figure 23 that will open and...

Page 74: ...t it and maintain the integrity of the data in it see section 9 4 page 81 sent to recipients unchanged only for e mails deleted or rejected by a spam scan For more see section 9 4 page 81 A backup cop...

Page 75: ...g the managed Exchange server For convenient viewing and searching for data in the backup storage and for data structuring purposes a custom filters configuration capability is provided details see se...

Page 76: ...ed to the object as a result of an anti virus scan see section 6 5 page 57 or anti spam scan details see Chapter 7 page 65 The application places into the backup storage a copy of an object before thi...

Page 77: ...n be used for example to search for objects that must be restored In order to create a backup storage filter 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange S...

Page 78: ...e attributes o file type E mails may be filtered by type Message result of spam scan Message Body Attachment result of anti virus scan or all types together o object name only available if you select...

Page 79: ...der When the filter is selected in the console tree only data that complies with the filter criterion will be displayed in the results pane Later on you can alter the values of filter parameters or de...

Page 80: ...removed from the backup storage Objects that meet the filter parameters will still be available in the Backup Storage folder 9 3 Restoring objects from the backup storage In order to restore an objec...

Page 81: ...hat the e mail will not be sent to the recipients listed in the Cc field To send an e mail to its recipients 1 In the main program window select Kaspersky Security 5 5 for Microsoft Exchange Server 20...

Page 82: ...m which the control is maintained 9 6 Deleting objects from the backup storage The following objects are automatically deleted from the backup storage older objects if there is a restriction imposed o...

Page 83: ...nstallation of the Security Server component The settings of the backup storage are determined by default and can be altered by the administrator In order to modify the backup storage parameters 1 Sel...

Page 84: ...omatically based on the application restriction selected Please note that objects cannot be transferred from the old backup storage to the new backup directory To set a restriction on the size of the...

Page 85: ...ited by default specify the number of days in the entry field the default value is 30 days If the size of the backup storage does not need to be restricted deselect the Auto delete objects from storag...

Page 86: ...ssages sent are created by the administrator in the form of a notification template When a certain event occurs an automatic notification of the corresponding type is issued based on such template Sev...

Page 87: ...rs of the existing templates and rename or delete templates using the shortcut menu commands In order to enable notification about objects detected during scan 1 Create a notification template see sec...

Page 88: ...actions on the General tab see Figure 29 Figure 29 Notification template The General tab Enter the template name in the Name field Specify the notification type It must match the event which would tr...

Page 89: ...escription of the macros in the list is provided in Appendix A page 160 Figure 30 Notification template The Text tab Select the notification method and specify the corresponding parameter values in th...

Page 90: ...he computers recipients in the Computers recipients field IP address or NetBIOS computer name can be used as the computer ad dress Entering several addresses is allowed the addresses entered must be s...

Page 91: ...y they were specified when the notification was created details see section 10 1 page 87 After you have made the changes press the OK or the Apply buttons to apply changes To exit without savings the...

Page 92: ...will open the General settings window where you should select the Advanced see Figure 32 tab Enter the information that will be displayed as the sender of messages generated by Kaspersky Security in...

Page 93: ...cified type within a certain limited time interval If the virus activity level is greater than the specified threshold a notification will be issued Notifications can be delivered using the following...

Page 94: ...This folder is included into the structure of each node reflecting the managed Exchange server The list of the virus outbreak counters created is displayed in the form of a table in the results pane s...

Page 95: ...al tab of the virus outbreak counter settings see Figure 34 11 1 Creating a new virus outbreak counter In order to create a new virus outbreak counter 1 Select the Virus outbreak counters folder in th...

Page 96: ...hreshold In order to do this specify the values for the settings in the Frequency group using the following order maximum allowable number of events of the specified type time period during which thes...

Page 97: ...l be used as a header of the message Create the message text in the Full notification text field The message may include information about a registered event To include this information add correspond...

Page 98: ...ns In order to send messages via network using the Net Send service check the Network notification using Net Send box and specify the addresses of the computers recipients in the Computers recipients...

Page 99: ...Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary server and select the Virus outbreak counters folder in the console tree 2 Select the cou...

Page 100: ...ny other folder selected by the administrator can be used as the report storage details see section 12 1 2 page 107 Reports sent by e mail are files in HTML format sent by e mail as attachments The me...

Page 101: ...eated according to the schedule or by request expected creation of the next report is expected based on the schedule disabled report generation is disabled for this template Detailed information about...

Page 102: ...upon request 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary serve...

Page 103: ...d or the analogous command under the Action menu 3 In the Report templates Properties window that will open see Figure 38 Figure 38 Configuring report settings Check the Keep report statistics box to...

Page 104: ...node corresponding to the server you need and select the Report templates folder in the console tree 2 Open the shortcut menu and use the New template command or the analogous command under the Action...

Page 105: ...the reporting period select For the last option in the Reporting period group and specify the interval and the time unit hours days weeks months specify exact date for the beginning and the end of th...

Page 106: ...n specify the folder where reports will be saved By default the Re ports folder located on the server in the application installation folder will be used for storing the reports You can specify a diff...

Page 107: ...he table in the results pane If the Create a report box in the General tab is checked the application will create reports according to the time specified in the schedule and with the specified frequen...

Page 108: ...template settings assigned created reports can be saved in the form of a folder sent by e mail as an attachment to a message In order to view a report saved as a folder 1 Enter the folder where the lo...

Page 109: ...der to view a particular section select its name in the table of contents and the content of the section will be loaded in the right frame In order to view the report delivered by e mail open index ht...

Page 110: ...the sections including the information they contain The sections are arranged in the same order as they are listed in the table of contents The structure and the content of the sections are identical...

Page 111: ...formats and depending on the format the naming conventions for the log files may be as follows kavscmesrvDATE log main application s event log where information pertaining to anti virus protection is...

Page 112: ...ified in the Diagnostics tab of the application settings window General settings see Figure 44 This window is accessible via the General settings link 13 1 Configuring the diagnostics level The amount...

Page 113: ...ght part of the table contains the list of components included into the selected module and the diagnostics level for each component Select the module in the left part of the table and then select the...

Page 114: ...eral settings window that will open see Figure 44 Enter the path to the new folder in the Server folder for log files field Select the frequency for creating logs in the Start a new log file every fie...

Page 115: ...ort on issues related to the installation configuration and the use of the purchased software product provided 24 hours a day by phone or via email the possibility to send suspicious objects to Kasper...

Page 116: ...iration of the commercial license the functionality of the application will be preserved except for the possibility to update its databases The application will continue to perform anti virus traffic...

Page 117: ...he user In this case the serial number of the license key will be added to the list of cancelled license keys the so called black list If your current license key is found in the black list the backup...

Page 118: ...er of the application installed license owner information license expiration date the status of the current license key application functionality available based on the current license key o Full The...

Page 119: ...key is found in the black list the backup key will not be activated In this case you have to replace the current license key You can manually install the backup license key as the current key There i...

Page 120: ...up license key section Figure 46 View license key info Configuring license notifications 3 Specify the license key file key to be installed in the file select dialog box that will open After the trial...

Page 121: ...Current license key section 3 Confirm the removal of the license key in the warning message that will be displayed on your screen As a result information in the fields of the corresponding sections w...

Page 122: ...e license notification to be issued e mail address of the recipient of the notifications In order to check this e mail address send an e mail message to it by pressing the Test button Entering several...

Page 123: ...ders storages section for those storage areas the content of which will not be scanned for viruses The list includes all storage areas of public folders created on the protected Exchange server By def...

Page 124: ...programs on the computer running Microsoft Exchange Server Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Network Agent and Administration Console included into the package of Kaspersky Ad...

Page 125: ...configure Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Update the anti virus and content filtration databases Install and remove license keys on client computers Review information about...

Page 126: ...ic to a certain task type 15 1 Managing policies This section describes how to create and manage policies of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Detailed information about managi...

Page 127: ...m you can redefine only those settings in the created group policy that are allowed to be changed by the top level policy Step 2 Enabling server protection In the Server protection dialog see Figure 4...

Page 128: ...003 Figure 49 Scanning of attachments Step 4 Enabling scanning of routed mail You can use the Protected e mail dialog see Figure 50 to disable scanning of mail routed by the server in order to decreas...

Page 129: ...for anti virus database and content filtration database updates specify the update source see section 5 3 page 41 configure local network settings in the window that opens when you click the Connecti...

Page 130: ...roup to another and handle the policies using the standard commands in the shortcut menu such as Copy Paste Cut Paste and Delete or identical commands in the Action menu 15 1 2 Viewing and editing pol...

Page 131: ...rties for Kaspersky Security 5 5 for Microsoft Exchange Server 2003 consisting of several tabs General Enforcement and Event processing tabs are standard Kaspersky Administration Kit tabs see details...

Page 132: ...n Date and time of the last policy modification On this tab you can edit the policy name enable or disable it or define its activation whenever specified events occur 15 1 2 2 Enabling disabling serve...

Page 133: ...ublic folders stored on the server check Enable background scan and configure the scan settings for more on background scanning see section 6 6 page 62 Figure 53 The Server protection tab 15 1 2 3 Sca...

Page 134: ...15 1 2 4 Scanning of routed mail You can use the Protected Mail tab see Figure 55 to enable disable scanning of mail traffic routed via an Exchange server Configuration of these parameters is similar...

Page 135: ...define the actions which the Kaspersky Security application will perform whenever it reveals objects containing malicious code In addition you can enable the option to create a copy of the original ob...

Page 136: ...curity application will perform whenever it detects messages bearing signs of spam and also to configure special markers for flagging the subject line of the message In addition you can enable the opt...

Page 137: ...15 1 2 7 Configuring the server protection productivity Anti Virus and Anti Spam productivity settings are configured on the Performance tab see Figure 58 These settings are configured in the same way...

Page 138: ...ers in the window which opens after clicking the Connection parameters button and configure settings for running updates under a different user account Configuration of these parameters is similar to...

Page 139: ...der to create a new template click the Append button in the Notification templates section and use the resulting window to configure the notification template Configuration of these parameters is simi...

Page 140: ...ting window to configure the counter Configuration of these parameters is similar to the case of application management via its local interface see details in section 11 1 page 95 As soon as a new cou...

Page 141: ...121 In addition you can define whose account will be used when sending notifications by e mail By default notifications are sent under KSE see section 10 3 page 91 Figure 61 The Notifications tab 15...

Page 142: ...istration of events on program operation on Administration Server On the Event processing tab see Figure 63 you can configure settings for recording events that occur in program operation on Kaspersky...

Page 143: ...ilure Warning Informational message Events of the same type may have various importance levels depending upon the situation in which they occur Use the Events severity drop down list to specify the im...

Page 144: ...y application The Enforcement tab see Figure 64 displays the following information about the policy applied to the computers in the selected group The number of computers this policy has been assigned...

Page 145: ...ation settings 1 In the Groups folder of the console tree select the folder containing the required client computer 2 In the results pane select the computer where the application settings have to be...

Page 146: ...he window are identical to similar ones in the policy configuration window see details in section 15 1 2 page 130 The section further will only describe the functionality different from the features p...

Page 147: ...neral information about Kaspersky Security 5 5 for Microsoft Exchange Server 2003 The upper window part contains the title of the installed application its version number installation date status runn...

Page 148: ...cense keys installed on the selected computer Figure 67 The Licenses tab 15 2 3 Start background scan Background scans of e mail saved on the server and in public folders are run on the Server protect...

Page 149: ...via an Exchange server and also enable disable protection of mailbox storages or public folders By default the application protects all mailbox storages and public folders existing on the protected m...

Page 150: ...late is the same as the one described in section 12 1 1 page 104 To review a report select the template used to create the report in the Report templates list and select the View reports command from...

Page 151: ...Application management using Kaspersky Administration Kit 151 Figure 70 The Templates and counters tab...

Page 152: ...nse key installation tasks when you need to extend the license to use Kaspersky Security Tasks of such type can be created not for the local computer only but also for client groups or a set of comput...

Page 153: ...Figure 72 Properties reviewing window for a client computer The Tasks tab The lower window portion contains task management buttons Click the Add button to create a new task please refer to the admin...

Page 154: ...ease refer to the administrator s guide for Kaspersky Administration Kit for details Customize notification settings for the results of task performance the Notification tab Please refer to the admini...

Page 155: ...tings tab of the Task name task properties see Figure 73 window Every task type has its specific settings THE ANTI VIRUS DATABASE UPDATE TASK For an anti virus database update task you can specify the...

Page 156: ...003 Question Why does the application cause a certain decrease in my computer performance and impose a considerable load on the processor The process of virus detection is a purely computational mathe...

Page 157: ...appens contact the dealer you purchased your copy of Kaspersky Security application from or Kaspersky Lab Ltd directly Question Why daily updates are required Several years ago viruses distributed via...

Page 158: ...ow methods using your Microsoft Internet Explorer settings or using custom settings In certain cases detailed below the update service may use the Microsoft Internet Explorer settings incorrectly o in...

Page 159: ...nnot arrive at our server What should be done in such case The situation results from the application of the Reject action to one of the messages containing signs of spam and addressed to your server...

Page 160: ...onding settings Macros Macros meaning OCURRENCE_NUMBER the total number of registered events PERIOD_LENGTH period length PERIOD_TYPE unit used to specify the time period seconds minutes hours days VIR...

Page 161: ...me not defined for OLE objects and for messages OBJECT_TYPE object type message file OLE object RECV_TIME time the message was received SCANNER_VERSION application version number SCANNER_VENDOR applic...

Page 162: ...rosoft Exchange Server 2003 Macros Macros meaning SUBMIT_TIME time the message was sent TO list of message recipients PRODUCT_NAME application name Kaspersky Security PROCESSED_TIME time the file was...

Page 163: ...ough the Internet In addition you can send a query to Technical Support by completing a special form on the Kaspersky Lab website under Services Technical Support Send request to Kaspersky Lab support...

Page 164: ...er 2003 In the next window of the web form specify your contact information Enter the security code from automatic registration and click the Send request button The Technical Support team will analyz...

Page 165: ...latest version of the anti virus database This scan involves public folders and protected storages mailbox storage The scan may identify new viruses that were not described in the anti virus database...

Page 166: ...ibutes that involves its physical removal from the computer We recommend using this method for processing messages that definitely contain SPAM Before the message is deleted its copy is saved to the b...

Page 167: ...e period is determined by the li cense key a standard license period is one year after the license key is installed After the license expires the application functionality will be re stricted M Manage...

Page 168: ...ides the anti virus protection of the server protection against SPAM and updating of the anti virus and the content filtration databases as well as administration ser vices for remote management confi...

Page 169: ...rus attack This value is of great significance in the periods of virus outbreaks as it helps the administrator timely react on the emerging threats of virus attacks Virus outbreak counter a template u...

Page 170: ...e protection from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step a...

Page 171: ...ing an on demand scan This feature considerably increases the speed of the program s operation The application creates a reliable barrier against viruses when they attempt to intrude your computer via...

Page 172: ...s designed to safeguard a computer running any Microsoft Windows operating system It protects your computer against unauthorized access and external hacker attacks from either the Internet or the loca...

Page 173: ...m reads the list of available news channels and their content from news server of Kaspersky Lab with specified frequency The product performs the following functions It visualizes in the system tray t...

Page 174: ...proactive technologies The program provides for complex anti virus checks including Anti virus scanning of e mail traffic on the level of data transmission protocol POP3 IMAP and NNTP for incoming ma...

Page 175: ...e system protection anti virus scanning of individual files directories or drives In addition the application can perform anti virus analysis exclusively for critical areas of the operating system and...

Page 176: ...ation saved both in internal memory of PDA and smartphones or on memory cards of any type on user demand anti virus monitor to intercept viruses in files that are either copied from other handhelds or...

Page 177: ...on You are free to choose from any of these anti virus applications according to the operating systems and applications you use Kaspersky Corporate Suite This package provides corporate networks of an...

Page 178: ...pe out up to 95 of unwanted traffic Installed at the entrance to a network where it monitors incoming e mail traffic streams for spam Kaspersky Anti Spam acts as a barrier to unsolicited e mail The pr...

Page 179: ...otects against malware penetrating your system while web surfing and scans files downloaded from the Internet Kaspersky Anti Virus for MIMESweeper for SMTP Kaspersky Anti Virus for MIMESweeper for SMT...

Page 180: ...HIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE WITH THE LEGISLATION REGARDING KASPERSKY SOFTWARE INTENDED FOR INDIVIDUAL CONSUMERS KASPERSKY ANTI VIRUS...

Page 181: ...hard disk CD ROM or other storage device of that Client Device This license authorizes you to make only as many back up copies of the Software as are necessary for its lawful use and solely for back...

Page 182: ...license you have obtained This license authorizes you to make or download such copies of the Documentation for each Client Device or seat that is licensed as are necessary for its lawful use provided...

Page 183: ...anti virus database b Free software updates including version upgrades c Extended technical support via e mail and phone hotline provided by Vendor and or Reseller d Virus detection and disinfection...

Page 184: ...without the consent of Kaspersky Lab b use the Software in a manner for which it was not intended or c use the Software other than as permitted under this Agreement vi The warranties and conditions s...

Page 185: ...een you and Kaspersky Lab whether oral or in writing which have been given or may be implied from anything written or said in negotiations between us or our representatives prior to this Agreement and...

Reviews: