background image

Kaspersky® Administration Kit

 

9

 

 

• 

create individual patterns for the application's operation by cre-

ating and running tasks for a set of computers from different 
administration groups. 

• 

Automatically update the anti-virus database and application modules on 
computers. This feature allows centralized updating of the anti-virus data-
base for all installed Kaspersky Lab applications, rather than each com-
puter accessing Kaspersky Lab's internet updates server for each individ-
ual update. The administrator can schedule automatic updating for all ap-
plications, and monitor the installation of updates on client computers. 

• 

Receive reports using a dedicated system. This feature allows the central-
ized collection of statistics about the operation of all installed Kaspersky 
Lab applications, and the creation of reports based on the statistics. The 
administrator can create a cumulative network report about the operation 
of an application, or reports about the operation of all applications in-
stalled on individual computers. 

• 

Use events notification system. The administrator can create a list of 
events which arise in the operation of applications about which he or she 
wants to be notified. The list of such events may include, for example, the 
detection of a new virus, an error that occurred while updating the anti-
virus database on a computer, or the detection of a new computer on the 
network. 

• 

Cooperate with Cisco Network Admission Control (NAC). This functional-
ity provides a mapping between host antivirus protection conditions and 
Cisco NAC statuses. 

The Kaspersky Administration Kit consists of three major components: 

• 

Administration Server

 centralizes the storage of information about 

Kaspersky Lab applications installed in the corporate network and about 
the management of these applications. This component supports all Win-
dows applications included in Kaspersky Lab Business Optimal and 
Kaspersky Corporate Suites. Separate versions of the Network Agent ex-
ist for Kaspersky Lab Novell and Unix Applications. 

• 

Administration Console 

provides a user interface to the administration 

services of the Administration Server and Network Agent. The manage-
ment module is implemented as an extension of the Microsoft Manage-
ment Console (MMC). 

1.1. The purpose of this document 

This Reference Book describes Kaspersky Administration Kit, and contains a 
step-by-step discussion of its functions. Basic concepts and the general 

Содержание ADMINISTRATION KIT 6.0

Страница 1: ...KASPERSKY LAB Kaspersky Administration Kit version 6 0 ReferenceBook...

Страница 2: ...K A S P E R S K Y A D M I N I S T R A T I O N K I T V E R S I O N 6 0 Reference Book Kaspersky Lab Ltd Visit our website http www kaspersky com Revision date February 2006...

Страница 3: ...16 2 2 2 Granting rights to groups 18 2 3 Viewing information about networks and IP subnetworks 20 2 3 1 Viewing information about the computer network 20 2 3 2 Method for displaying the computer netw...

Страница 4: ...nistration Servers 59 2 8 1 Adding a new slave Administration Server 59 2 8 2 Configuring the connection of the slave server to the main server 61 CHAPTER 3 REMOTE APPLICATION MANAGEMENT 63 3 1 Config...

Страница 5: ...2 14 Pausing resuming tasks manually 136 3 2 15 Monitoring task execution 136 3 2 16 Viewing results of the task execution stored on the Administration Server 137 3 2 17 Configuring the event filter f...

Страница 6: ...3 3 Customizing event queries 163 5 3 4 Saving information about events to a file 167 5 3 5 Deleting events 167 5 4 Reports 167 5 4 1 Creating a report template 167 5 4 2 Viewing and editing report te...

Страница 7: ...ackup copy of the Administration Server data manually The klbackup utility 198 5 9 4 2 Moving the Administration Server to a different computer 200 5 9 4 3 Moving the Administration Server database to...

Страница 8: ...and from one centralized location monitor the observance of the license agreement that is that the number of applications operating in the network is less than or equal to the num ber of licenses and...

Страница 9: ...e in the operation of applications about which he or she wants to be notified The list of such events may include for example the detection of a new virus an error that occurred while updating the ant...

Страница 10: ...book Various formatting features and icons are used throughout this document depending on the purpose and the meaning of the text The table below lists the conventions used in the text Format feature...

Страница 11: ...p is created only on the administrator s workstations when Administration Console is installed 2 1 2 Connecting to the Administration Server To connect to the Administration Server select the node cor...

Страница 12: ...he Secure Sockets Layer protocol SSL Unselect this box if you do not want to communicate via SSL However this will lower the security of data transmissions against modification or interceptions Use da...

Страница 13: ...e a new certificate will be displayed see Figure 2 Select one of the following I want to connect to the server and download the certificate from it select this option to connect to the Administration...

Страница 14: ...a member of the logical network operators group KLOperators or of the administrators group KLAdmins try logging on under another account see Figure 3 In the corresponding form specify a user account...

Страница 15: ...e of the server in the logical network on which you plan to work see above and if necessary check the Use SSL connection checkbox to enable secure connection If you have no logical network operator or...

Страница 16: ...sponding item in the Action menu 2 2 Granting rights 2 2 1 Granting rights to use the Administration Servers To grant rights to users to work with the logical network of Administration Server 1 Select...

Страница 17: ...rmissions All includes Reading Execution and Writing rights Reading o connecting to the Administration Server o viewing the logical network structure or administration group o viewing the values of ap...

Страница 18: ...e functionality of Kaspersky Administration Kit To assign rights select the required group of users and check boxes next to the names of the permissions being granted If you wish to check all boxes ch...

Страница 19: ...ion Server network To configure individual access rights for an administration group which are different from those specified in the Administration Server settings uncheck the Inherit box 3 Configure...

Страница 20: ...and workgroups of the corporate Windows network Each of the folders at the lowest level contains a list of computers of the respective domain or workgroup which are not included in the structure of t...

Страница 21: ...ect the New IP subnetwork command or use the corresponding item from the Action menu The New IP subnetwork command is available only when displaying the Network folder as IP subnetworks 2 In the New I...

Страница 22: ...mand or use the corresponding item in the Action menu This will open the dialog window Properties Subnetwork name that includes the General and IP ranges tabs You can do the following in the General t...

Страница 23: ...regular polling of the computers in this sub network by the Administration Server If you do not want the Administration Server to poll the subnetwork uncheck the Al low IP subnetwork scanning box Fig...

Страница 24: ...9 specify the method to define the range and enter the values for the method selected Select one of these options Specify the IP subnetwork using the address and the sub network mask in this case you...

Страница 25: ...ties on the popup menu or click the corresponding option on the Action menu This opens the Properties Active Directory Group Name dialog containing a General tab cf Figure 10 This tab can be used to s...

Страница 26: ...ersky Administration Server Server Name node Either click Quick Start Wizard on the shortcut menu or on the Action menu 2 Initially the computer network is polled and computers within this network are...

Страница 27: ...e Unassigned mode when logical network is created i e it is switched off or disconnected from the network the wizard will not add this computer to the logical network The computer can be added later w...

Страница 28: ...n uses data stored on the main server in the configura tion file ncd dat This file is located in the folder NCD in the Kaspersky Administration Server installation folder If the Administration Server...

Страница 29: ...tes a anti virus protection system for logical network clients using versions 5 0 and 6 0 of Kaspersky Anti Virus for Windows Workstations In this case the Administration Server creates a policy and d...

Страница 30: ...olicy is called Download updates task and has default settings The task of copying backup data of the Administration Server is in the Global Tasks node of the console tree with the name Backup copying...

Страница 31: ...147 Click Next The wizard window displays the process of creating the tasks and the policies If errors occur an error message will be displayed 6 Select in the next window of the wizard see Figure 15...

Страница 32: ...older a list of objects included in this group will be displayed in the details panel You can also expand the corresponding branch of the console tree To view information about group policies select t...

Страница 33: ...t a folder with the name of the required group in the Groups folder and then use either the Properties command from the shortcut menu or from the Action menu This will open the Group name Properties d...

Страница 34: ...ked it will be automatically installed For the Unassigned group properties and its subgroups see Figure 29 the New client computer in the group section contains the checkbox Add computer to group If t...

Страница 35: ...Directory group or IP subnetwork from which new computers will be moved Figure 17 Viewing group properties The Computers tab The Computer status tab specifies criteria for determining whether a clien...

Страница 36: ...xample you can establish the maximum number of days during which the client computer has not connected to the Administration Server After this period of time is elapsed the computer is assigned Critic...

Страница 37: ...ection 4 2 3 on page 151 2 5 3 Viewing information about the client computer To view information about a logical network client Select the group in the Groups folder that contains the desired client T...

Страница 38: ...tion settings with the Administration Server by using the Do not disconnect from the Administration Server checkbox If the checkbox is checked the client server connec tion is permanent By default the...

Страница 39: ...st virus scan Viruses found total number of viruses detected from the first scan until the virus counter was reset To reset the counter click Reset virus counter on the shortcut menu or on the Ac tion...

Страница 40: ...configure its settings for details see section 3 1 1 2 on page 66 On the Tasks tab you can manage tasks for client computers view existing tasks delete and create new tasks start and stop them change...

Страница 41: ...he main Administration Server select the Administration servers node in the folder of the required group 2 In the Administration servers node select the required slave Server and either select the Con...

Страница 42: ...he setting is specified as modifiable in the slave Server policy it can be changed in the application settings see section 3 1 1 2 on page 66 or task settings see section 3 2 4 on page 124 the icon wi...

Страница 43: ...configure group settings 1 Select the required group in the console tree or in the results pane and use the Properties command in the shortcut menu or the corresponding item in the Action menu 2 This...

Страница 44: ...e Reset Virus Counter button to reset the counter for the viruses detected on all client computers in the group Figure 25 Configuring group settings The General tab The following settings can be confi...

Страница 45: ...section speci fies how the Administration Server reacts to the inactivity of cli ent computers of this group o if you wish the logical network administrator to be notified after a period of inactivity...

Страница 46: ...ling to the administration group Using the Select button specify the Active Directory group or the IP subnetwork from which new computers will be moved The Computer status tab see Figure 27 specifies...

Страница 47: ...at the level of the parent group and are inherited by all groups in the logical network To establish individual criteria for a group uncheck the Inherit box and configure the settings For groups at th...

Страница 48: ...n the computer hosting the Administration Console The lower part contains the list of possible permissions All includes Reading Execution and Writing rights Reading o connecting to the Administration...

Страница 49: ...Agent and the Administra tion Console components o granting to users and groups of users access rights to the functionality of Kaspersky Administration Kit To assign rights select the required group...

Страница 50: ...tically installed For all installation packages for which boxes are checked deployment group tasks with names like Installation Name of the selected installation package will be created You can run th...

Страница 51: ...ng computers to the logical network To add a computer computers to the logical network 1 In the Group folder select the group folder to which you wish to add the client computer If you are adding a cl...

Страница 52: ...s on the Windows network as the computer s address To import the list from a file specify a txt file with the list of addresses being added by the computer Each address must be located on a separate l...

Страница 53: ...Delete or analogous items from the Action menu Computers deleted from the logical network will be moved to the Network group The moving operation can also be performed using the mouse 2 7 3 Moving a...

Страница 54: ...elect Kaspersky Network Agent and Change Kaspersky Administration Server Task as the application and the task type respectively see Figure 30 Figure 30 Selecting the application to be installed 4 Duri...

Страница 55: ...e new Administration Server specify the port number to be used for secure connection to the new Administration Server using the SSL protocol check the Use proxy server box if you are connecting to the...

Страница 56: ...Settings tab see Figure 31 of the task property window details of the task settings configuration see section 3 2 4 on page 124 Figure 32 Viewing the Administration Server change task settings 5 If y...

Страница 57: ...Network Agent this utility is located in the component s root installation folder and when run from the command line can perform the following actions depending on the command line parameters used co...

Страница 58: ...st connection to the Administration Server silent launch the utility in non interactive mode This modifier can be useful for instance when launching the utility from the launch scenario when registeri...

Страница 59: ...By default the information will be stored in file stdout tx If the modifier is not used the parameters results and error messages will be printed to the screen sp display the password used to authenti...

Страница 60: ...the main server Specify the address of the main Administration Server You can use either its IP address or computer s name in the Windows network as the computer s address If a proxy server is used fo...

Страница 61: ...he Properties Administration server computer name window that will open click the Server hierarchy settings hyperlink on the General tab 3 In the Master server settings window that will open check the...

Страница 62: ...the slave Server now belongs After this you can connect to the slave Server via the main server from the Administration Server node Figure 33 Configuring the slave Administration Server s connection t...

Страница 63: ...n menu to start a new policy wizard Follow the wizard s instructions 2 At this stage you must specify the policy name and the application for which this policy is being created Enter the policy name I...

Страница 64: ...can be activated see section 3 1 1 4 on page 79 Mobile user policy This policy will be applied after you disconnect the computer from the corporate logical network This type of policy is available fo...

Страница 65: ...he icon will change to Local application settings have a higher priority than policy settings For a policy to take effect on client computers you should lock certain parameters When creating a policy...

Страница 66: ...s 3 1 1 2 Viewing and configuring policy settings To view group policy settings and or modify them In the console tree choose the required group and select the Policies folder in this group In the det...

Страница 67: ...for ex ample Kaspersky Anti Virus 5 0 for Windows Workstations application version creation date and time date and time of last modification the Activate policy based on the event box and the list use...

Страница 68: ...indicated by the icon will change To prevent users modifing mandatory settings on client computers left click the icon The icon will change to checked all application settings will be changed accordi...

Страница 69: ...voked only parameters editable under the policy i e those marked with will revert to their original values Modify all Parameters when Policy is First Applied This would cause all local parameters to a...

Страница 70: ...ails button The Details dialog box displays a table that has the following columns Computer client name Domain name of the domain to which the client belongs Status the policy status which may have on...

Страница 71: ...application related events what type of events to record how to notify the administrator or other users upon virus protection related events and where to store event logs Figure 41 Editing a policy T...

Страница 72: ...has changed Rules for handling events are defined for each level of severity 1 From the drop down list select the severity level Critical Error Warning or Info 2 Events corresponding to the selected...

Страница 73: ...er the notification recipient s email address in the Re cipient Address field Several addresses can be entered as a list separated by commas or semi colons o Enter the email server address in the SMTP...

Страница 74: ...ET SEND cf Figure 44 Under this option use the field be low to enter recipient host addresses for network notifications An IP address or a Windows network name may be used Sev eral addresses may be en...

Страница 75: ...igure 44 At the bottom of the tab enter the message which will be delivered as notification If the Use Administration Server Settings checkbox is checked the message text specified on the Administrati...

Страница 76: ...n this tab by clicking the Test button This will cause a test notification send window to open cf Figure 46 In the event of errors detailed error information will be displayed Figure 46 Configuring no...

Страница 77: ...inistrator workstation The events are logged in the Events node of the console tree check the Store events locally checkbox to save events locally on each client In this case you can only view event l...

Страница 78: ...1 1 3 Displaying Inherited Policy in Nested Group Result Panel To have inherited policies display in a nested group under the Policies folder 1 Select the Policies folder in a nested group s result pa...

Страница 79: ...based on an event To activate a group policy automatically when a certain event occurs 1 Select the required group in the results panel and either select the Properties command from the context menu o...

Страница 80: ...e application group policy settings window that will open 3 Select the Policy for a mobile user item from the drop down list in the Policy status field 4 Press the Apply or button Following activation...

Страница 81: ...ing the Network Agent s policy When creating a policy for the Network Agent in the Settings window see Figure 48 you can specify the following settings in the Event log field specify the maximum file...

Страница 82: ...he time in terval in minutes between attempts to synchronize data of the client computers and the Administration Server check the Use SSL connection box if you wish the connection to be secure using S...

Страница 83: ...the in built firewall will block UDP port 15000 To access the Administration Server you will have to open this port manually Figure 49 Creating policy for the Network Agent The Network window When ed...

Страница 84: ...dministration Agent Ports in Windows Firewall This will cause the UDP port required to support Administration Agent to be added to the Microsoft Windows firewall exception list Figure 50 Creating poli...

Страница 85: ...ttings window see Figure 52 specify the following In the Connection settings for the Administration Server field the number of the port used to connect to the Administration Server The default value i...

Страница 86: ...able automatic network polling check the Allow scan box in the Windows network group To enable automatic polling of IP subnetworks check the Allow scan box in the IP subnets group The Administration S...

Страница 87: ...cy parameters may be modified Use the Host visibility time out mins field on the Settings tab to specify the time during which the client computer will be considered visible to the network after the c...

Страница 88: ...s network polling intervals Full scan time min additional information on computers is re quested including Operating System IP address and DNS name The default polling frequency is 60 minutes Quick sc...

Страница 89: ...identical to those in the like named tab under Administration Server properties The Cisco NAC tab may be used to define a mapping between antivirus protection conditions and Cisco NAC statuses The set...

Страница 90: ...a list of all policies existing for this group Select a policy and click Export on the shortcut menu or on the Action menu In the window that opens specify the name of the file where the policy will...

Страница 91: ...applications installed on this computer and displays general information about them If the client computer is an administrator workstation and or a Administration Server the list contains the Kaspersk...

Страница 92: ...n The tabs are specific to each application For more information about the tabs see the corresponding user documentation The General Licenses and Event processing tabs are common for all applications...

Страница 93: ...talled on a client computer In the Current license key field you can view data on the current license key Number the license key serial number Type type of the installed key for example commercial or...

Страница 94: ...od license validity period Limit computer count the license restrictions imposed by the key Figure 59 Application properties dialog box The Licenses tab The Event severity tab displays rules for handl...

Страница 95: ...settings in the console tree select the Kaspersky Administration Server Server name node that corresponds to the required Administration Server Click Properties either on the shortcut menu or in the...

Страница 96: ...he installed application path of the public access folder used for storing application de ployment files and the updates downloaded to the Administra tion Server Figure 61 Viewing the Administration S...

Страница 97: ...pplication version Information about the manufacturer Kaspersky Lab and copyright information Date and time of plug in creation Figure 62 Viewing application plug in properties The Application plug in...

Страница 98: ...rties of the selected slave server In this dialog box you can Specify whether this Administration Server is a slave server Specify the address and port of the master Administration Server Specify or m...

Страница 99: ...The default port number is 14000 If this port is already in use you can change it SSL port number displays the SSL port number used to se curely connect to the Administration Server The default port i...

Страница 100: ...om the Administration Server The default value is 120 minutes After the specified time has elapsed the Administration Server will consider the client computer inactive Figure 65 Viewing Administration...

Страница 101: ...k of virus attacks increases o Host is out of control unable to establish connection with the Network Agent installed on the client computer o Host status is Critical a computer with settings matching...

Страница 102: ...r of licenses in use is over 90 of the maximum number supported by this license key o New host found a new client has been found during network browsing o The host was automatically added to group a n...

Страница 103: ...policies for applications as default settings Settings on this tab match the policy settings Specify email notification parameters o Enter the notification recipient s e mail address in the Re cipient...

Страница 104: ...or semicolons Figure 67 Viewing Administration Server properties The Notification tab Run Executable group use the Browse button to select an executable to run when an event is triggered Executable e...

Страница 105: ...nd configure appropriate values in the resulting window cf Figure 43 To reduce the impact on the Server s resource usage limit the number of notifications sent by the Administration Server by clicking...

Страница 106: ...tected viruses during a specified time interval If the number of viruses detected for a short period exceeds the threshold the event is classified as a Virus outbreak This parameter allows the adminis...

Страница 107: ...polling by the Administration Server The Windows network group of fields is used to configure the general network polling settings To enable automatic network polling check the Allow scan box Specify...

Страница 108: ...hin the range Polls occur with the frequency specified in the Scan period mins field By default the polling interval is 420 minutes You can specify a different value or cancel polling by unchecking th...

Страница 109: ...en integrated with Cisco NAC the Administration Server acts as a standard Posture Validation Server PVS component which an administrator may use to either allow a computer to access or prevent it acce...

Страница 110: ...lts pane and select the Properties command on the shortcut menu or use the analogous item from the Action menu 2 Switch to the Applications tab in the window that opens 3 In the list of applications i...

Страница 111: ...Remote Application Management 111 Figure 74 The Network Agent settings window The Settings tab...

Страница 112: ...to configure settings for connecting the Agent to the Administration Server these settings are hardwired which is possible because these components are installed on the same computer 3 2 Managing appl...

Страница 113: ...the list which displays all Kaspersky Lab applications that have Console Plug ins installed on the administrator workstation Select the type of the task from the Choose type of task for execution list...

Страница 114: ...tart start the task at application startup o Manually start the task manually from the Kaspersky Administration Kit main window by clicking the Start command on the shortcut menu or on the Action menu...

Страница 115: ...ncy value is set at 6 and the default start date and time for the task is set to the current system date and time of your computer o The procedure for the task to start if the client computer is unava...

Страница 116: ...If you set up the task to start Daily Figure 79 specify the following o The frequency of task startups in the Every field and the start time in the Schedule to run field For example if the Every days...

Страница 117: ...time in the Schedule to run field By default the task will start on Sunday 18 00 00 You can change the default time if necessary For example if the value of the Every field is Sunday and the value of...

Страница 118: ...task For example if the value of the Every day of month field is 20 and the value of the Schedule to run field is 3 00 00 AM the task will start on the 20th of every month at 3 p m The default value i...

Страница 119: ...of the task launch in the Run on field and the launch time in the Schedule to run field The values of these fields are set automatically and correspond to the current system date and time You can cha...

Страница 120: ...start Manually Figure 83 At application start or Immediately after a task is created specify o Actions to take if a client is temporarily unavailable at task start cf description above o Randomized sc...

Страница 121: ...ted task in the Exit Code field Completed Successfully or Error o Actions to take if a client is temporarily unavailable at task start see above Figure 84 Task start following completion of another ta...

Страница 122: ...necessary you can configure task settings see section 3 2 4 on page 124 3 2 2 Creating a global task To create a global task In the console tree select the Tasks node and click the New Task command o...

Страница 123: ...ould either create a new task or make appropriate changes to the current task settings After the wizard completes the global task you created will be added to the Tasks node in the console tree and di...

Страница 124: ...mentation for the corresponding applications 3 2 4 Viewing and changing task settings To view and or change task settings to create modify a group task choose a target group in the console tree and se...

Страница 125: ...s The group policy settings for global tasks are not shown You can view the actual settings for this task in the Computer name Properties dialog box on the Tasks tab Figure 87 The General tab Figure 8...

Страница 126: ...op Pause and Resume You can temporarily remove the task from the list of scheduled tasks To do this uncheck the Run at Scheduled Time checkbox Though the task will not be deleted it will not be launch...

Страница 127: ...iate ac cess rights For example for on demand scans the account should have access rights to the scanned object for update tasks the account should be able to access the shared folder on the Administr...

Страница 128: ...2 8 on page 133 The content of the Schedule tab and its operation are analogous to those available in the schedule settings configuration window that opens when you create a task see section 3 2 1 on...

Страница 129: ...ients cen trally in Administration Server Windows event log Use the same field to specify which events are to be logged o Log All o Log Task Progress o Log Execution Result Only In the Notify administ...

Страница 130: ...ing task settings The Notification tab The global task properties dialog box has the Target computers tab see Figure 93 which has a list of logical network clients on which the selected task is runnin...

Страница 131: ...olicies in a nested group under the Group Tasks folder 1 Select the Group Task folder in a nested group result pane 2 Open a popup menu select Type and check Inherited Tasks This will cause inherited...

Страница 132: ...open check the Activate computer before the task is launched by function Wake On LAN min box and indicate the required time As the result the operating system of the computer will startup before the t...

Страница 133: ...figuring window see Figure 88 uncheck the Schedule box As a result the task will remain in the list but will not be launched according to the schedule 3 2 10 Creating application start stop task To st...

Страница 134: ...134 Kaspersky Administration Kit Figure 95 Start stop application task Task settings dialog box Figure 96 Editing the Start stop application task...

Страница 135: ...where the task will be saved and its location Click Save 3 2 12 Importing a task To import a task from a file In the console tree select the required group Open the shortcut menu of the Tasks folder...

Страница 136: ...ttings window for the task you need see section 3 2 4 on page 124 and switch to the General tab see Figure The following information will be displayed in the lower part of the tab Pending number of co...

Страница 137: ...following information will be displayed Host name of the client computer on which the task is de fined Group the name of the administration group that contains the client computer Status the current t...

Страница 138: ...Computer name Properties dialog box using the History button on the Tasks tab see below You will see information stored on the Administration Server If task history is stored locally on a workstation...

Страница 139: ...the Task execution results field To restrict the amount of information to be displayed after the filter has been applied check the Restrict the number of dis played events box and indicate the maximum...

Страница 140: ...ers tab 4 Define the event and task execution registration time on the Time tab see Figure 102 You can select the following options During a period and define fixed dates for the beginning and end of...

Страница 141: ...results window 3 2 18 Configuring event filter for a selected computer To configure filter for the information displayed in the Task execution results window 1 Select Filter from the shortcut menu Th...

Страница 142: ...a specific type check the Events box and check boxes next to the names of the required types If the event type is not specified all types of events will be displayed To ensure that the task execution...

Страница 143: ...3 2 17 on page 138 The Computer tab is not provided as the filter is configured for a selected computer only 3 To confirm the changes press the OK button The filter means that only information that sa...

Страница 144: ...obal task see section 3 2 2 on page 122 To create the downloading updates task select Kaspersky Administration Kit as the application for which you want to create the task and the Download updates tas...

Страница 145: ...rce to the list press the Add button and select one of the following options in the Updates source properties window that will open see Figure 104 Kaspersky Lab s update servers for receiving updates...

Страница 146: ...the parameters in the window that opens see Figure 105 If you connect to the updates server via a proxy server check the Use proxy server box and enter the address and the port number to be used to co...

Страница 147: ...ask On the Settings tab you can change update task settings as follows Define the contents of the updates to be downloaded from an update source in the Update sources group of fields see section 4 1 1...

Страница 148: ...of the task for receiving updates by slave Administration Servers using the Force update of slave servers box view the location of the folder containing the updates received from the source in the Lo...

Страница 149: ...dministration Server will be displayed in the results pane 4 1 4 Viewing properties of the downloaded updates To view update properties Select the required update in the details panel and click Proper...

Страница 150: ...or application modules updates Name and version of the application to which the update ap plies Size of the update saved on the Administration Server Date when the update was copied to the Administrat...

Страница 151: ...y after they are received in the settings of the Administration Server s receiving updates task check the Force updating of slave servers box As the result immediately after the updates are received b...

Страница 152: ...lt value is 14000 If the host running the Administration Server is specified as the Update Agent port 14001 is used by default specify the number of the port via which the client computer will be secu...

Страница 153: ...ill the fields Multicast IP and Port Number IP MULTICAST Port number For details on the distribution of installation packages using updating agents see the Implemen tation guide To view update agent s...

Страница 154: ...type the type of the license key installed for example commercial trial Restrictions license restrictions imposed by the key License period the validity period of the license key 5 1 2 Viewing license...

Страница 155: ...Targets tab contains the list of client computers on which this license key is installed The tab contains the following information name of the client computers administration group whether or not th...

Страница 156: ...al task see section 3 2 1 When creating this task Specify the application for which you are installing this license key as the application for which the task is being created specify License key insta...

Страница 157: ...ogous item under the Action menu This will launch a global task creation wizard this wizard will miss the step which selects the task type as the task type will be selected by default Tasks created us...

Страница 158: ...the logical network use a built in template License key report or create a new template of the same type see section 5 4 1 on page 167 The report is created based upon the License key report template...

Страница 159: ...ns will contain the following information about the object name under which the object was delivered for processing by the anti virus application object description action that was performed on the ob...

Страница 160: ...e results pane and use the Delete command from the shortcut menu or the analogous item in the Action menu The anti virus application that quarantined this object or placed it into backup storage on th...

Страница 161: ...er scan task will be launched on the client computer for the anti virus application that quarantined the selected object 5 3 Event logs Event queries 5 3 1 Viewing Kaspersky Administration Kit event l...

Страница 162: ...in either ascending or descending order change the order of columns or add and remove columns To facilitate viewing and searching for required information there is a provision for creating and config...

Страница 163: ...es command from the shortcut menu or the analogous item in the Action menu 2 This will open the query configuration window that contains the tabs General Events Computers and Time On the General tab y...

Страница 164: ...in To obtain information only about results of the last task launch check the Show only last results of the task box To restrict the amount of information to be displayed in the query check the Restri...

Страница 165: ...in specify the range of IP addresses of computers by checking the Range of IP addresses box and enter the start and end IP address Figure 119 Configuring events query The Computers tab Specify time fo...

Страница 166: ...the period To do this select Events for the date in the field groups from and until and specify the exact date and time If all registered information is required select the First Event and the Last ev...

Страница 167: ...nly box 3 During the second step select the file format Export as a text divided by tabulation marks text file Export as UNICODE text divided by tabulation marks UNICODE format text file 4 To close th...

Страница 168: ...the For recent days option and specify the number of days in the field on the right This step is not required for reports reflecting the current state for example for reports on the current anti virus...

Страница 169: ...122 Creating a report template Selecting objects to be reported 6 Specify the group or select specific clients from different groups for which you want to create a report and close the wizard Figure 1...

Страница 170: ...Properties dialog box see Figure 124 The tabs in this dialog box are specific to each report type The General tab contains general information about the template On this tab you can change the name of...

Страница 171: ...field table together with the record sorting order and filter settings To create the list of fields use the Add and Delete buttons The field order may be changed with the Move Up and Move Down button...

Страница 172: ...172 Kaspersky Administration Kit Figure 125 The report template settings window The Details fields tab...

Страница 173: ...sorting On the Summary fields tab see Figure 127 fields that form a table with summary data included in the report are defined as well as the sort order of the records pertinent to these fields Setti...

Страница 174: ...y fields tab The Totals tab see Figure 128 contains calculated fields of the report To delete an object from the report template select it in the Details fields list and press the Remove button To add...

Страница 175: ...n the corresponding window see Figure 123 in the report template creation wizard Click the Apply or OK button to apply the settings 5 4 3 Generating and viewing reports To generate a report using a te...

Страница 176: ...ing items Company logo the type and name of the report report brief de scription and reporting period and information about the objects for which this report was created Summarized data calculated sum...

Страница 177: ...port template in the Reports node on the master Administration Server In the shortcut menu click the Properties item and on the General tab set the following parameters check Include data from slave K...

Страница 178: ...tatus Using System Registry Data To view client antivirus protection status using data written to the system registry by the Administration Agent 1 Open client s system registry for example locally by...

Страница 179: ...aximum protection 6 Enabled low level of protection maximum response speed 7 Enabled recommended settings 8 Enabled user defined settings Protection_RtpState REG_DWORD 9 Failed Protection_LastFscan RE...

Страница 180: ...y search criteria in the following tabs Network Application Computer status Virus protection and External application Using the Network tab see Figure 131 you can specify the following search criteria...

Страница 181: ...value from the drop down list The list contains names of only those applications for which management plug ins are installed on the administrator s workstation Application version specify the version...

Страница 182: ...ng search criteria Computer status select the current computer status from the list OK Critical or Warning Computer status description check boxes next to the con ditions on which the selected status...

Страница 183: ...he Virus protection tab see Figure 134 you can specify the following search criteria Anti virus database date indicate the anti virus database re lease date Anti virus database records range Last full...

Страница 184: ...to use information about computers stored on the slave Administration Servers check the Use data from the slave servers up to level box and specify the maximum nesting level to be included in the sear...

Страница 185: ...puters The External application tab 5 6 2 Saving computer search results in a text file To save the search results into a text file press the Export to file button in the Find computers window see Fig...

Страница 186: ...r in the console tree To add computers to the query configure the query parameters Figure 136 Configuring a computer query 5 7 2 Configuring a computer query To configure a computer query 1 Select the...

Страница 187: ...uded in the logical network To perform a search which includes information about computers stored on the slave Administration Servers check the Use data from the slave servers up to level box After th...

Страница 188: ...the time when new computers appear in the network to do this check the New computers detected during the network poll ing and specify period in days in the Period of detection days field Figure 138 C...

Страница 189: ...rotection on the computers which will be included in the query on the Virus protection tab You can specify date of the creation of the anti virus database used by the ap plications to do so check the...

Страница 190: ...Anti virus protection tab On the Computer status tab see Figure 141 specify parameters that characterize the status of the computers and the status of the real time protection performed on computers...

Страница 191: ...e anti virus database and program modules 191 Figure 141 Configuring a computer query The Computer status tab On the External application see Figure 141 specify the external application installed on t...

Страница 192: ...tack detection mechanism To ensure that the Virus attack event is registered in the logical network and that the notification of this event is issued 1 In the console tree select the node correspondin...

Страница 193: ...Worm Trojan and Malware event type and check the Save on Administration server for days checkbox under event properties on the Logging tab The Virus attack event cannot be created more than once in 24...

Страница 194: ...Administration Server component it is located in the root of the installation folder 5 9 2 Restoring the Administration Server data from a backup copy To restore the Administration Server data run the...

Страница 195: ...inistration sever Figure 143 Creating a backup data copying task Selecting application and task type Specify on this step of settings configuration see Figure 144 o the backup storage folder for savin...

Страница 196: ...Administration Sever policy tasks application settings events saved on the Administra tion Server o configuration information about the structure of the logical network and client computers o storage...

Страница 197: ...nd or use the analogous item in the Action menu 2 In the window that opens select the Settings tab see Figure 145 This tab displays the same settings that were determined when the task was created fol...

Страница 198: ...opying utility 5 9 4 1 Creating a backup copy of the Administration Server data manually The klbackup utility To create a backup copy of the Administration Server data manually start the klbackup util...

Страница 199: ...ifier is specified information will be saved into the root of the BACKUP_PATH folder When attempting to save information into the folder in which a backup copy already exists an error message will app...

Страница 200: ...t computer 1 Create a backup copy of the Administration Server data 2 Install a new Administration Server To simplify moving the logical network it is desirable that the new server s address matches t...

Страница 201: ...o simplify moving the logical network it is desirable that the new server s address matches the old server s address Address computer s name in the Windows network or IP address must be indicated in t...

Страница 202: ...ption or a similar option under the Action menu This will open the Properties Administration Server Name dialog 2 Select the Cisco NAC tab cf Figure 72 3 In the upper field select a Cisco NAC status H...

Страница 203: ...t your order if you purchased the product via the internet To send a message about problems with the application operation to the Techni cal Support Service open the Kaspersky Lab s website www kasper...

Страница 204: ...node Enter your e mail address in the E mail address field Press the Next button Provide the following information in the next window Indicate your contact details in the Contact information section...

Страница 205: ...on system based on Kaspersky Lab applications Administration Server A Kaspersky Administration Kit component that centrally stores information about Kaspersky Lab applications installed on clients and...

Страница 206: ...e specific to each application and are included in all Kaspersky Lab applications that can be managed through Kaspersky Administration Kit Centrally managing an application Managing an application thr...

Страница 207: ...ndividual applications The policy involves configuration of all parameters of applications I IChecker technology A technology that excludes the objects from future scans that remained unmodified since...

Страница 208: ...he license period defined by the license key is one year from the date of purchase After your license expires the application functionality will be restricted Local network administrator A user who in...

Страница 209: ...efore enabling access to an object Kaspersky Anti Virus scans it for viruses and if a virus is detected blocks access to the object disinfects it or deletes it depending on user defined settings Recom...

Страница 210: ...rtup Some viruses attempt to infect the startup objects and can cause startup failure Suspicious object An object that contains either a modified code of a well known virus or a code reminiscent of a...

Страница 211: ...ld number of viruses detected for a specified time interval When this number is exceeded the situation is regarded as a Virus outbreak virus attack This parameter is important for defining virus epide...

Страница 212: ...protection from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step ah...

Страница 213: ...y Kaspersky Lab Ltd Kaspersky OnLine Scanner This program is a free service provided to the visitors of Kaspersky Lab s corporate website The service delivers an efficient online anti virus scan of yo...

Страница 214: ...stem The program allows users to create a list of applications which it will control on a per component basis It helps protect application integrity against the influence of mali cious software Monito...

Страница 215: ...ges to the file system and registry and restores the system after ma licious influence Protection against Internet fraud is ensured by recognition of phishing attacks thereby preventing confidential d...

Страница 216: ...omatically scanned as well as files when attempts are made to access them Protection from text message spam Kaspersky Anti Virus for File Servers This software package provides reliable protection for...

Страница 217: ...ty is a software package withal new approach to security for today s corporate networks of any size providing centralized protection information systems and support for remote offices and mobile users...

Страница 218: ...Management Intel vPro Kaspersky Business Space Security provides optimal protection of your company s information resources from today s Internet threats Kaspersky Business Space Security protects wor...

Страница 219: ...vers Scanning of all e mails on Microsoft Exchange Server including shared folders Processing of e mails databases and other objects for Lotus Domino servers Protection from phishing attacks and junk...

Страница 220: ...ams whose signatures are not yet added to the database Protection of mail servers and linked servers Scans Internet traffic HTTP FTP entering the local area network in real time scalability of the sof...

Страница 221: ...a dedicated e mail gateway The solution includes Kaspersky Administration Kit Kaspersky Mail Gateway Kaspersky Anti Virus for Lotus Notes Domino Kaspersky Anti Virus for Microsoft Exchange Kaspersky A...

Страница 222: ...list object types and user groups Quarantines suspicious objects Easy to use administration system Reporting system for program operation Support for hardware proxy servers Scalability of the software...

Страница 223: ...per for Exchange Clearswift MIMEsweeper for Web The program is a plug in and scans for viruses and processes inbound and outbound e mail traffic in real time C 2 Contact Us If you have any questions c...

Страница 224: ...OU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE WITH THE LEGISLATION REGARDING KASPERSKY SOFTWARE INTENDED FOR IN...

Страница 225: ...spersky Lab s update servers 1 1 3 If you sell the computer on which the Software is installed you will ensure that all copies of the Software have been previously deleted 1 1 4 You shall not decompil...

Страница 226: ...d or obtaining of the End User identifier Customer ID technical support service renders only assistance in Software activation and registration of the End User ii By completion of the Support Services...

Страница 227: ...hased on a physical medium will perform substantially in accordance with the functionality described in the Documentation when operated properly and in the manner specified in the Documentation ii You...

Страница 228: ...excluded by law ii Subject to paragraph i above Kaspersky Lab shall bear no liability whether in contract tort restitution or otherwise for any of the following losses or damage whether such losses or...

Страница 229: ...from the Effective Date ________________________________________________________________ When using demo software you are not entitled to the Technical Support specified in Clause 2 of this EULA nor d...

Отзывы: