background image

Frequently asked questions 

159

 

Kaspersky Security, files in that format can be damaged during their deliv-
ery via an Exchange server. 

 

Question: After installation of Kaspersky Security on one of servers in 
our organization, the nearest relay server began generating a queue of 
messages, which cannot arrive at our server. What should be done in 
such case?

 

The situation results from the application of the 

Reject

 action to one of the 

messages containing signs of spam and addressed to your server.  

The problem will be resolved without additional actions when the relay 
server’s timeout expires, then receipt of the queued messages will be re-
sumed. You can also delete the rejected message manually from queue 
and use force connection method for the remaining messages to resolve 
the issue. 

 

 

Содержание MAIL GATEWAY 5.5 -

Страница 1: ...KASPERSKY LAB Kaspersky Security 5 5 for Microsoft Exchange Server 2003 ADMINISTRATOR S GUIDE ...

Страница 2: ...K A S P E R S K Y S E C U R I T Y 5 5 F O R M I C R O S O F T E X C H A N G E S E R V E R 2 0 0 3 Administrator s Guide Kaspersky Lab http www kaspersky com Revision date November 2006 ...

Страница 3: ...operation on a cluster of servers 18 CHAPTER 3 INSTALLING UPDATING AND REMOVING THE APPLICATION 20 3 1 Installing the application 20 3 1 1 First time installation 21 3 1 2 Reinstalling the application 24 3 2 Removing the application 25 3 3 Upgrading from a previous version 25 CHAPTER 4 STARTING USING THE APPLICATION 26 4 1 Starting the application 26 4 2 Application interface 26 4 2 1 Main applica...

Страница 4: ... 3 Scanning attachments 53 6 4 Scanning of routed e mail traffic 56 6 5 Selecting actions to be performed with objects 57 6 6 Background scan 62 CHAPTER 7 ANTI SPAM PROTECTION 65 7 1 Enabling disabling anti spam protection 66 7 2 Selecting the action to be performed with the message 67 7 3 Configuring TCP IP settings 70 7 4 Configuring e mail filtration 70 CHAPTER 8 APPLICATION S OPERATION EFFICIE...

Страница 5: ...guring log settings 114 CHAPTER 14 LICENSE KEYS 115 14 1 License information 117 14 2 Installing the license key 119 14 3 Removing a license key 121 14 4 License related notifications 121 14 5 Unprotected storage areas 122 CHAPTER 15 APPLICATION MANAGEMENT USING KASPERSKY ADMINISTRATION KIT 124 15 1 Managing policies 126 15 1 1 Creating a policy 126 15 1 2 Viewing and editing policy settings 130 1...

Страница 6: ...ttings 145 15 2 1 Reviewing the information about application 147 15 2 2 Reviewing the license key information 148 15 2 3 Start background scan 148 15 2 4 Selection of protected storage 149 15 2 5 Viewing reports 150 15 3 Task management 152 15 3 1 Running and stopping tasks 154 15 3 2 Configuring task parameters 155 CHAPTER 16 FREQUENTLY ASKED QUESTIONS 156 APPENDIX A TABLE OF SUBSTITUTION MACROS...

Страница 7: ...ail servers fill mailboxes with unwanted messages cause the loss of working time and inflict serious financial losses Additionally it is to be noted that the newest malicious programs use the so called spamming technologies for efficient mass distribution and the methods of social psychology to make the user open the message etc Therefore SPAM filtering is important not only for convenience but al...

Страница 8: ... they do not infect other programs or data Trojans are not capable of independently penetrating computers Their users spread them under the guise of useful software The damage that they incur can exceed that done by traditional virus attacks by several fold Recently worms have become the most widespread type of malware followed by viruses and Trojans Some malicious computer programs have character...

Страница 9: ...der to compile a list of the software installed on the computer gather information on the quality of the connection bandwidth modem speed etc Jokes Software that does not do any direct damage but displays messages stat ing that damage has already been done or will be done under certain con ditions These programs often warn the user of dangers that do not exist such as messages that pop up about fo...

Страница 10: ...Spam can be roughly divided into four categories Formal messages messages that are automatically generated and sent to recipients by automated mail program functions as for example notifications of undeliverable messages or confirmation of the user s registration at some Internet website Probable SPAM messages that can not be unambiguously identified as SPAM but that raise suspicions when checked ...

Страница 11: ...he application allows generation of reports using templates with a preset level of detail and at a required interval detecting virus outbreaks as they emerge and notifying about such events The application identifies attempts of mass mailing infected messages both from the Internet and from the computers within the corporate network configuring application settings depending on the intensity and t...

Страница 12: ...nd other service folders 1 4 Software system requirements Requirements to protected server Microsoft Windows Server 2000 with Service Pack 4 installed or higher Microsoft Windows 2000 Advanced Server with Service Pack 4 and higher installed or higher Microsoft Windows Server 2003 Standard Edition and higher Microsoft Windows Server 2003 Enterprise Edition and higher Microsoft Exchange Server 2003 ...

Страница 13: ...hat the envelope with the installation CD remained sealed By opening the envelope containing the installation CD or by installing the product on your computer you accept all terms and conditions of the License Agreement 1 6 Services provided for registered users Kaspersky Lab Ltd offers to all legally registered users an extensive service package enabling them to boost the performance of Kaspersky...

Страница 14: ...ons used in the text Format feature Meaning Usage Bold font Titles of menus menu items windows dialog boxes and their elements etc Note Additional information notes Attention Information requiring special attention In order to perform 1 Step 1 2 Description of the successive user s steps and possible actions Task example Statement of a problem example of the demonstration of the application s capa...

Страница 15: ...t the server and the content of all public folders are scanned each time the anti virus database is updated or according to the schedule The scan may identify new viruses that were not described in the anti virus database at the time when previous scans were performed This task is performed in the background mode and does not have any effect on the performance of the mail server If the user reques...

Страница 16: ... Microsoft Exchange Server via SMTP protocol and forwards them to the anti spam scan subsystem Anti spam Scan Subsystem scans e mail messages for spam This feature is implemented as a Microsoft Windows service which starts automatically when a message that must be scanned arrives Anti virus Scan Subsystem performs anti virus scan of objects This component includes several processes with one anti v...

Страница 17: ...e is not installed the applica tion will function within the default limitations and using the default settings see section 4 6 page 33 The server protection against malicious programs and SPAM will be enabled automatically when Microsoft Ex change Server is started 3 Create the list of managed servers see section 4 3 page 30 4 Connect the Management Console to the servers see section 4 4 page 31 ...

Страница 18: ...of servers Kaspersky Security 5 5 for Microsoft Exchange Server 2003 does not fully support the cluster technology however it will function correctly on a cluster of servers treating each node as a separate physical Exchange server A message arriving at a virtual Exchange server will be forwarded to one of the cluster s nodes Streams of e mail messages for each node may not intersect The applicati...

Страница 19: ...30 When adding managed servers and configuring connection of Management Console to the Server use the names of physical servers on which the Security Server is installed The use of a virtual Exchange server name may cause an addressing error when the Microsoft Exchange Server is moved to a different node of the cluster 4 Connect the Management Console to the servers see section 4 4 page 31 5 Confi...

Страница 20: ...ation components of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Security Server and Management Console This configuration is recommended at the initial stage of creating the Exchange servers anti virus protection system You can select either complete or custom installation of the application or repair an incorrect installation of Kaspersky Security After the Management Console is ins...

Страница 21: ...or Microsoft Exchange Server 2003 If Microsoft Exchange Server is not installed on your computer or if its version does not meet the software requirements a warning will be displayed on your screen In this case you can proceed with the installation but you will only be able to use one of the application components the Management Console In order to install the full version of Kaspersky Security ab...

Страница 22: ...onditions contained therein to proceed with the installation Step 4 Selecting the type of the installation In the dialog for setup type selection specify whether both application components Security Server and Management Console should be installed complete installation or just one of them custom installation If you run installation from the Exchange server that needs to be protected and you plan ...

Страница 23: ...installation Step 6 Enabling server protection In the Server protection window you will be offered to enable automatically the anti virus protection and server protection against spam immediately after the wizard completes its work You can do that manually using the application Management Console see section 6 2 page 51 If the application performance at the level and with the parameters applied by...

Страница 24: ... personal key that contains all service information required for the full featured functionality of the application namely support information who is providing support and how you can get help restriction on the number of mailboxes the license name number and expiration date Install the key to ensure full functionality of the application In order to do this press the Add button and select the key ...

Страница 25: ...g you to confirm stopping the Microsoft Exchange Information Store and the Microsoft Internet Information services Agree to stop these services to let the uninstallation process complete its work correctly Once the uninstallation process is complete the initial status of these services will be automatically restored 3 3 Upgrading from a previous version If the installer detects that your business ...

Страница 26: ... Microsoft Windows menu This programs group is cre ated only on the administrator s workstations when the Management Con sole is installed 4 2 Application interface The user interface of the application is provided by the Management Console component The Management Console is a dedicated isolated facility integrated into MMC 4 2 1 Main application window The main application window see Figure 2 co...

Страница 27: ...eral settings used for viewing general application s operation settings license details and information about installed license keys renewing the license and configuring the application operation diagnostics settings Anti virus protection used for viewing and configuring the managed server s anti virus protection settings Anti Spam protection used for viewing and configuring the settings of the se...

Страница 28: ... about detected outbreaks 4 2 2 Shortcut menu Each category of objects in the console tree has its own shortcut menu that opens after right clicking an object with the mouse In addition to standard MMC commands this shortcut menu contains commands used for handling a particular object The list of objects and the corresponding set of commands accessible via the context menu are provided in the tabl...

Страница 29: ... for creating reports Virus outbreak counters New counter Create and configure a new criterion to be used for identifying a virus outbreak and settings to be used for notification about such outbreak Additional shortcut menu commands are also provided for report templates and for the backup storage objects Using the Create a report command you can create a report based on the selected template The...

Страница 30: ... 5 5 for Microsoft Exchange Server 2003 node in the console tree open the shortcut menu and select the Add server command or a similar item from the Action menu This will open the Add server window see Figure 3 Figure 3 The Add server dialog box 2 Specify a computer with the Security Server component installed If the server component is installed on the same computer as the Management Console sele...

Страница 31: ...l include nested folders Notification templates Backup storage Report templates and Virus outbreak counters If the connection has not been established or could not be established you can connect to such server manually see section 4 4 page 31 In order to remove a server from the list of managed servers select the node that corresponds to the server you wish to remove in the console tree open the s...

Страница 32: ...to it In this case working with the same server from several consoles you should regularly update information on each console In order to do this use the Refresh command available via the shortcut menu or the similar command in the Action menu 4 5 Minimum required configuration After the installation the application will start working with the minimum set of parameters most of which are default op...

Страница 33: ... the object and if disinfection is impossible the application deletes the object and replaces it with a text file containing a notification in the following format Malicious object VIRUS_NAME has been detected File OBJECT_NAME was deleted by Kaspersky Security 5 5 for Microsoft Exchange Server 2003 If an object that cannot be disinfected is detected in the body of the message the body of the messa...

Страница 34: ... or messaged that do not contain SPAM are detected these messages will be delivered intact to the Inbox of the user s e mail client when a suspicious message which possibly contains SPAM or message containing obscene words or message definitely containing SPAM are detected such message will be moved to the Junk E mail folder of the user s e mail client All public folders all storage areas created ...

Страница 35: ... the EICAR organization at http www eicar org anti_virus_test_file htm If you have no Internet connection you can create your own test virus To create a test virus type the following string in any text editor and save the file as eicar com X5O P AP 4 PZX54 P 7CC 7 EICAR STANDARD ANTIVIRUS TEST FILE H H The file downloaded from the EICAR website or created as described above contains the body of a ...

Страница 36: ...lumn lists prefixes to be added at the beginning of the string of the standard test virus for example DELE X5O P AP 4 PZX54 P 7CC 7 EICAR STANDARD ANTIVIRUS TEST FILE H H After adding a prefix to the test virus save it for example to a file under the name eicar_dele com assign names to all the modified viruses in the same manner The second column of this table contains the types of objects identif...

Страница 37: ...plication 37 When such message arrives at Exchange Server Kaspersky Security will assign it SPAM status and will process it applying the action specified for this type of objects by the administrator see section 7 2 page 67 ...

Страница 38: ...y important to keep you databases up to date We recom mend that you update your databases immediately after your application is installed because the databases included into the distribution kit will be out of date by the moment you install your application These databases are updated on an hourly basis on the Kaspersky Lab s server We recommend that you setup automatic updates with the same frequ...

Страница 39: ...see section 5 2 page 40 specify the updates source see section 5 3 page 41 configure the network connection settings see section 5 2 page 40 You can setup different updates parameters for the anti virus database and for the content filtration database 5 1 Manual updating In order to update the anti virus and the content filtration databases in the manual mode In the main application window select ...

Страница 40: ...on The application will launch the updating process using the selected settings 5 2 Automatic updates In order to update the database in the automatic mode 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and follow the Updates link in the results pane 2 Switch...

Страница 41: ...erent modes for updating the anti virus and the content filtration databases In order to do this check the Allow different anti virus and anti spam settings box This will divide the schedule setup window into two corresponding sections For example you can create separate schedules for updating the anti virus and the content filtration databases and disable the automatic updating feature for one of...

Страница 42: ...in the Updates window that will open see Figure 6 and specify the updates source required Updates servers of Kaspersky Lab Kaspersky Lab s HTTP and FTP internet servers where new updates are uploaded every hour default option Below you can specify the update server of Kaspersky Lab which is nearest to your geographical location In order to do that select your current location from the respective d...

Страница 43: ...icrosoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and follow the Updates link in the results pane 2 Switch to the Network Settings tab see Figure 7 in the Updates window that will open and configure the network connection settings If you connect to the internet using a proxy server check the Use proxy server box and specify the conn...

Страница 44: ...he Connection timeout sec field If the connection was not established within the specified time limit the application will attempt to establish connection to the next update server until the connection is established or until all servers will be tried for connection Check the Use passive FTP mode box if your server has a firewall and you cannot connect to the required FTP server in the active mode...

Страница 45: ...oxy server You can use this feature to run updates with another profile that has those rights To configure an update to start under a different user profile 1 In the main program window select Kaspersky Security 5 5 for Microsoft Exchange Server 2003 from the console tree open it select the node that corresponds to the server needed and click the Updates hyperlink in the results pane 2 In the Upda...

Страница 46: ...46 Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Figure 8 Configuring update settings The Startup options tab ...

Страница 47: ...M and the E mail Interceptor analyzes the mail traffic received from the Exchange server and transfers it to the Anti Virus Scan Subsystem The Anti Virus Scan Subsystem processes e mail messages based on the settings configured scans and analyzes the object using the anti virus database if an e mail message or its part is infected the application processes the detected object in accordance with th...

Страница 48: ...ached files of any format It is to be noted that Kaspersky Security differentiates between simple objects an executable file a message with a simple attachment and containers consisting of several objects for example an archive or a message with any message attached to it If necessary you can define the list of objects that should not be scanned for viruses The following types of objects can be ex...

Страница 49: ...cts through the mail server All currently known malicious programs Programs that do not contain malicious code as it is commonly under stood but may impose a moral threat inflict financial damage or facilitate abduction of confidential information This software category includes adware various harmless utilities that can be used by malicious soft ware and intruders automatic dialing programs that ...

Страница 50: ...e legal software that may work in a way that can be viewed by the application as a behavior characteristic of malicious or potentially dangerous software Examples of such software are backdoor and remote surveillance software Categories of objects detected by Kaspersky Security in the mail flow of the protected server are determined by the anti virus protection level selected The application provi...

Страница 51: ...nd storage scan will be performed In order to enable or disable the anti virus protection or change anti virus protection level 1 Select the node corresponding to the server you need in the console tree and follow the Anti virus protection link in the results pane 2 Go to the General tab in the Anti virus protection see Figure 9 window that will open Select the one of the following options in the ...

Страница 52: ...tore the default settings by pressing the Restore the default settings button In order to apply the changes press the Apply or the OK button The anti virus protection will then be enabled or disabled in sev eral minutes Figure 9 Enabling the anti virus protection We do not recommend disabling the server s anti virus protection by disabling the Kaspersky Security 5 5 for Microsoft Exchange Server 2...

Страница 53: ...rus mail protection using the Management Console see above 3 Enable the anti spam server protection using the Management Console see section 7 1 page 66 6 3 Scanning attachments In order to decrease the load on the server when the anti virus scan is performed you can limit the list of the objects to be scanned and put a restriction on the time for scanning one object These scan restrictions will b...

Страница 54: ...field to the right Since archives are one of the types of containers the restric tions applied to the scan of archives and containers are inter related If you impose a restriction to the scan of containers archives will then be scanned only to the specified nesting level if they are not explicitly excluded from the scan scope However excluding archives from the scan scope will not affect the scan ...

Страница 55: ...t o tx all files with mask tx o test all files with name test Figure 11 Specifying the masks for files to be excluded from the scan scope Files defined by type Using the Append and Remove buttons create the list of attachment types that will be excluded from the scan scope When adding an exception in the Adding a type window see Figure 12 select a type from the drop down list Figure 12 Specifying ...

Страница 56: ...eed and follow the Anti virus protection link in the results pane 2 Go to the Protected Mail see Figure 13 tab in the Anti virus protection window that will open 3 Check the Do not scan routed mail box in the Routed mail group of boxes checked by default While enabling scanning of routed mail please make sure that the anti virus protection for the Microsoft Exchange Server storage containing the S...

Страница 57: ...each object can be assigned a status as listed below Not infected object does not contain viruses Infected object contains at least one of the known viruses Suspicious object s code is similar to the code of a known or unknown virus Protected object is password protected Corrupted object is corrupted Depending on the object s status different actions will be applied ...

Страница 58: ...he name change affects attached objects only if a virus was detected in the message body no renaming is performed Replace infected objects with text delete the detected object and replace it with text message body or a txt file attachments created based on the replacement template Delete the entire message delete the infected message along with all attachments If the infected attachments are disin...

Страница 59: ... made no changes You must save the message In order to define the rules for processing objects detected during an anti virus scan 1 Select the node corresponding to the server you need in the console tree and follow the Anti virus protection link in the results pane 2 Go to the Actions tab in the Anti virus protection window see Figure 14 that will open Figure 14 Configuring actions to be applied ...

Страница 60: ... values A detailed description of the option selected in the table is provided in the bottom part of the window The further steps will depend on the selection you have made In order to continue using the wizard press the Next button If no additional settings configuration is required the Finish button will become enabled In order to complete the wizard press this button 5 If you selected disinfect...

Страница 61: ...opied to the message body and into the replacement txt file Create a replacement template In order to do this enter the mes sage text into the wizard window The text of this notification may include information about the virus detected and about the infected object To include this information add corresponding substitution macros to the template selecting them from the dropdown list ac cessible vi...

Страница 62: ...pplication scans the body of the message and attached files in accordance with the general settings of the anti virus scan If background storage scan is disabled e mail messaged stored on the server will be scanned only when a particular e mail message is requested by the user In this case such e mail message will be scanned immediately before the delivery Only mailboxes located in the protected s...

Страница 63: ...cked by default and specify the desired scan launch option Every time the anti virus database is updated launch the scan every time the anti virus database is updated According to schedule launch the scan according to the specified schedule Specify the mode and the time for the scan in the window that opens by pressing the Configure button see Figure 19 ...

Страница 64: ...he scan immediately press the Start now button Figure 18 4 You can restrict the scan time In order to do this check the Stop scan in NN hours box and specify the desired time period in hours After this period of time 24 hours by default expires the scan will be stopped In order to apply the changes press the Apply or the OK button ...

Страница 65: ...age attributes the sender s and the recipient s addresses message size headers including the From and the To headers Secondly anti spam content filtration is used to analyze the content of the message including the Subject header and the attached files1 The application uses unique linguistic and heuristic algorithms based on the comparison of actual messages with the sample messages and on the dee...

Страница 66: ...n 7 2 page 67 7 1 Enabling disabling anti spam protection In order to enable disable anti spam protection 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and follow the Anti Spam protection link in the results pane 2 Сheck uncheck the Enable anti spam box in t...

Страница 67: ...r 2003 start function manually through Manage computer Services see section 6 2 page 51 7 2 Selecting the action to be performed with the message In order to select an action to be performed with a message in which spam has been found In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it se lect the node corresponding t...

Страница 68: ...nt are carried out after the action Move to the Junk E mail folder For example if the rule requires automatic deletion of all messages from the Junk E mail folder then the message will be deleted No copies of this message will be saved to the backup storage Decline block the message delivery to the recipient The declined message sent via SMTP protocol by the user within the corporate network will ...

Страница 69: ...ge see Chapter 6 page 47 If necessary you can restore the message from the backup storage or forward it to recipients unchanged If you do not want copies to be saved uncheck the Save a copy of the original object in the backup storage box You can restore the default settings by pressing the Restore the default settings button Figure 22 Configuring Anti Spam settings The Actions tab ...

Страница 70: ...r to do this enter the appropriate values in the TCIP IP settings section in the Advanced tab of the Anti Spam protection window see Figure 23 Figure 23 Configuring anti spam protection settings The Advanced tab 7 4 Configuring e mail filtration Kaspersky Security does not have its own e mail filtration using Realtime Block List RBL or e mail addresses This function is carried out by Microsoft Exc...

Страница 71: ...obal Settings node select Message Delivery and select Properties from the context menu 3 In the window that opens select the Connection filtering tab You can read more about creating configuring and applying connection filters in the documentation or help files of Microsoft Exchange Server 2003 To configure recipient filtration 1 Open Exchange System Manager 2 Open the Global Settings node select ...

Страница 72: ...ee open it select the node corresponding to the server you need and follow the Anti virus protection link in the results pane 2 Go to the Additional settings tab in the Anti virus protection window see Figure 18 that will open 3 In the Protection performance group of fields specify the desired parameters which determine the performance of anti virus protection The number of streams that contain ob...

Страница 73: ... the node corresponding to the server you need and follow the Anti Spam protection link in the results pane 2 Go to the Advanced tab in the Anti Spam protection window see Figure 23 that will open and specify the values for the efficiency settings Specify the number of kernel instances that are running simultaneously in the Number of copies of the anti spam kernel field the default value is 2 x th...

Страница 74: ...ct it and maintain the integrity of the data in it see section 9 4 page 81 sent to recipients unchanged only for e mails deleted or rejected by a spam scan For more see section 9 4 page 81 A backup copy of the object will be created only if the Save a copy of the original object in the backup storage box in the anti virus protec tion settings see section 6 5 page 57 and anti spam settings see sect...

Страница 75: ...ng the managed Exchange server For convenient viewing and searching for data in the backup storage and for data structuring purposes a custom filters configuration capability is provided details see section 9 2 page 77 Filters created for the backup storage can be viewed in the Backup Storage folder as subfolders under the names assigned by the administrator when the filters were created 9 1 Viewi...

Страница 76: ...ned to the object as a result of an anti virus scan see section 6 5 page 57 or anti spam scan details see Chapter 7 page 65 The application places into the backup storage a copy of an object before this object is processed by the application The Status field displays the object status after processing Detected Exact date and time when the object was detected by Kaspersky Security Reason The reason...

Страница 77: ...an be used for example to search for objects that must be restored In order to create a backup storage filter 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and select the Backup Storage folder in the console tree 2 Use the New Filter command in the context m...

Страница 78: ...le attributes o file type E mails may be filtered by type Message result of spam scan Message Body Attachment result of anti virus scan or all types together o object name only available if you select attachment filtering in the Type field o sender of the e mail o recipient of the e mail o recipient of e mail copy o e mail subject o time interval during which the e mail was sent When completing th...

Страница 79: ...lder When the filter is selected in the console tree only data that complies with the filter criterion will be displayed in the results pane Later on you can alter the values of filter parameters or delete the filter using the shortcut menu commands or the Action menu items In order to change the filter parameters 1 Select the filter you need to modify in the Backup Storage folder in the console t...

Страница 80: ...e removed from the backup storage Objects that meet the filter parameters will still be available in the Backup Storage folder 9 3 Restoring objects from the backup storage In order to restore an object from the backup storage 1 Select the Backup Storage folder in the console tree 2 Select the object you wish to restore in the table displaying the content of the backup storage see Figure 24 You ca...

Страница 81: ...that the e mail will not be sent to the recipients listed in the Cc field To send an e mail to its recipients 1 In the main program window select Kaspersky Security 5 5 for Microsoft Exchange Server 2003 from the console tree open it select the node that corresponds to the server needed and select the Backup storage folder from the console tree 2 Select the object to send from the table that displ...

Страница 82: ...om which the control is maintained 9 6 Deleting objects from the backup storage The following objects are automatically deleted from the backup storage older objects if there is a restriction imposed on the backup storage size and if there is not enough space to store a new object The application will delete the number of older objects required to free the space needed objects whose storage period...

Страница 83: ...installation of the Security Server component The settings of the backup storage are determined by default and can be altered by the administrator In order to modify the backup storage parameters 1 Select the Backup Storage folder in the console tree 2 Open the shortcut menu and use the Properties command or the analogous command under the Action menu 3 In the Backup Storage Properties window that...

Страница 84: ...tomatically based on the application restriction selected Please note that objects cannot be transferred from the old backup storage to the new backup directory To set a restriction on the size of the backup storage or on the time objects are stored in it check the Auto delete objects from storage box select one of the restriction options and enter the desired value for the setting Maximum backup ...

Страница 85: ...mited by default specify the number of days in the entry field the default value is 30 days If the size of the backup storage does not need to be restricted deselect the Auto delete objects from storage box In order to apply the changes press the Apply or the OK buttons To exit without saving the changes press the Cancel button ...

Страница 86: ...essages sent are created by the administrator in the form of a notification template When a certain event occurs an automatic notification of the corresponding type is issued based on such template Several templates of the same type but with different parameter values may be created which allows creating notifications for the administrator sender recipient and security services that vary as far as...

Страница 87: ...ers of the existing templates and rename or delete templates using the shortcut menu commands In order to enable notification about objects detected during scan 1 Create a notification template see section 10 1 page 87 or select an existing template and configure its settings see section 10 2 page 91 2 Check the Notify about event box in the General tab of the notification template settings dialog...

Страница 88: ...g actions on the General tab see Figure 29 Figure 29 Notification template The General tab Enter the template name in the Name field Specify the notification type It must match the event which would trigger the notification to be created In order to specify the type select the required value from the Type drop down list If necessary enter a more detailed description of the notification in the Desc...

Страница 89: ...description of the macros in the list is provided in Appendix A page 160 Figure 30 Notification template The Text tab Select the notification method and specify the corresponding parameter values in the Actions tab see Figure 31 The application provides for several methods to be used In order to send messages via the mail server check the Notify by e mail box and specify the recipients addresses f...

Страница 90: ...the computers recipients in the Computers recipients field IP address or NetBIOS computer name can be used as the computer ad dress Entering several addresses is allowed the addresses entered must be separated by semicolons The validity of the addresses can be verified using the Test button A message will be sent to the specified address In order to register events in the Microsoft Windows system ...

Страница 91: ...ay they were specified when the notification was created details see section 10 1 page 87 After you have made the changes press the OK or the Apply buttons to apply changes To exit without savings the changes press the Cancel button 10 3 Customizing general notification settings When the application sends e mail notifications it places the KSE Kaspersky Security for Microsoft Exchange Server value...

Страница 92: ...t will open the General settings window where you should select the Advanced see Figure 32 tab Enter the information that will be displayed as the sender of messages generated by Kaspersky Security in the From field Figure 32 Configuring common notification settings ...

Страница 93: ...ecified type within a certain limited time interval If the virus activity level is greater than the specified threshold a notification will be issued Notifications can be delivered using the following methods by e mail messages by messages sent over the network using Net Send by registering the event in the Microsoft Windows system log on the computer where the Security Server component is install...

Страница 94: ... This folder is included into the structure of each node reflecting the managed Exchange server The list of the virus outbreak counters created is displayed in the form of a table in the results pane see Figure 33 The table displays the name type and status is notification about virus activity enabled or disabled for each counter The counter type corresponds to the type of events traced by this co...

Страница 95: ...ral tab of the virus outbreak counter settings see Figure 34 11 1 Creating a new virus outbreak counter In order to create a new virus outbreak counter 1 Select the Virus outbreak counters folder in the console tree 2 Open the shortcut menu and use the New counter command or the analogous command under the Action menu 3 As a result of these actions a new virus outbreak counter settings window New ...

Страница 96: ...threshold In order to do this specify the values for the settings in the Frequency group using the following order maximum allowable number of events of the specified type time period during which these events must be registered time unit seconds minutes hours or days If required enter a more detailed description of the virus outbreak counter in the Description field Specify whether notifications ...

Страница 97: ...ll be used as a header of the message Create the message text in the Full notification text field The message may include information about a registered event To include this information add corresponding substitution macros to the template selecting them from the dropdown list accessible via the Macros button The full list of the substitution macros is provided in Appendix A page 160 Select the n...

Страница 98: ...ons In order to send messages via network using the Net Send service check the Network notification using Net Send box and specify the addresses of the computers recipients in the Computers recipients field IP address or NetBIOS computer name can be used as the computer ad dress Entering several addresses is allowed the addresses entered must be separated by semicolons The validity of the addresse...

Страница 99: ... Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary server and select the Virus outbreak counters folder in the console tree 2 Select the counter you need in the table displaying the list of created counters see Figure 33 3 Open the shortcut menu and use the Properties command or the analogous command under the Action menu 4 As a result o...

Страница 100: ...Any other folder selected by the administrator can be used as the report storage details see section 12 1 2 page 107 Reports sent by e mail are files in HTML format sent by e mail as attachments The message contains clarification text as follows This message is created by Kaspersky Security 5 5 for Microsoft Exchange Server 2003 The attached file contains a report on the anti virus server scans du...

Страница 101: ...reated according to the schedule or by request expected creation of the next report is expected based on the schedule disabled report generation is disabled for this template Detailed information about report template settings is provided in the settings window accessible through the Properties shortcut menu command details see section 12 1 2 page 107 The administrator can create new templates vie...

Страница 102: ... upon request 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary server and select the Report templates folder in the console tree 2 Select the report template you need in the table displaying the list of created templates see Figure 37 3 Open the shortcut menu and use...

Страница 103: ...nd or the analogous command under the Action menu 3 In the Report templates Properties window that will open see Figure 38 Figure 38 Configuring report settings Check the Keep report statistics box to limit the storage period for reports then indicate the actual storage period and select the unit The default storage period is three months Check the Limit maximum size of report sections box to rest...

Страница 104: ... node corresponding to the server you need and select the Report templates folder in the console tree 2 Open the shortcut menu and use the New template command or the analogous command under the Action menu 3 As a result a report template settings window New report will open see Figure 39 this window consists of the following tabs General Settings and Actions Specify the required settings value in...

Страница 105: ...p the reporting period select For the last option in the Reporting period group and specify the interval and the time unit hours days weeks months specify exact date for the beginning and the end of the reporting period In order to do this select For the period option in the Reporting period group and specify the desired date in the From and To fields In order to create a schedule perform the foll...

Страница 106: ...en specify the folder where reports will be saved By default the Re ports folder located on the server in the application installation folder will be used for storing the reports You can specify a different folder by typing in the path or by using the Browse button In order to create and send reports via the e mail server check the Send report by e mail box and enter the e mail addresses in the To...

Страница 107: ...the table in the results pane If the Create a report box in the General tab is checked the application will create reports according to the time specified in the schedule and with the specified frequency Reports can also be created by the administrator s request 12 1 2 Viewing and fine tuning the report templates In order to view or modify the report template settings 1 Select the Report templates...

Страница 108: ... template settings assigned created reports can be saved in the form of a folder sent by e mail as an attachment to a message In order to view a report saved as a folder 1 Enter the folder where the logs are stored By default it is the Reports folder located on the server in the application installation folder 2 Select the subfolder with the name corresponding to the date and time of report creati...

Страница 109: ...rder to view a particular section select its name in the table of contents and the content of the section will be loaded in the right frame In order to view the report delivered by e mail open index htm file attached to the message As a result the system default browser will be loaded The required report about the results of server scanning for viruses or spam depending upon the report type will b...

Страница 110: ...y the sections including the information they contain The sections are arranged in the same order as they are listed in the table of contents The structure and the content of the sections are identical to those of the report saved to disk In order to navigate while viewing the report use the scroll bar of your browser In order to move to the beginning of a section select this section in the table ...

Страница 111: ...o formats and depending on the format the naming conventions for the log files may be as follows kavscmesrvDATE log main application s event log where information pertaining to anti virus protection is appended kscmasDATE log main application s event log where information pertaining to anti spam server protection is appended FILENAME rawDATE log a log that contains unformatted data pertaining to t...

Страница 112: ...dified in the Diagnostics tab of the application settings window General settings see Figure 44 This window is accessible via the General settings link 13 1 Configuring the diagnostics level The amount and the completeness of the information entered into the logs depend on the diagnostics level for each application module specified in the application settings If a module consists of several compon...

Страница 113: ...ight part of the table contains the list of components included into the selected module and the diagnostics level for each component Select the module in the left part of the table and then select the required component in the right part of the table Select the desired diagnostics level using the diagnostics level drop down list Specify the required diagnostics levels for each module After you ar...

Страница 114: ...neral settings window that will open see Figure 44 Enter the path to the new folder in the Server folder for log files field Select the frequency for creating logs in the Start a new log file every field by selecting the required value from the drop down list Specify the number of log files of the same format that can be stored by the application In order to do this specify the desired value in th...

Страница 115: ...port on issues related to the installation configuration and the use of the purchased software product provided 24 hours a day by phone or via email the possibility to send suspicious objects to Kaspersky Lab for expert analysis The application verifies the validity of the license agreement by the license key that is an integral part of any Kaspersky Lab s product Kaspersky Security 5 5 for Micros...

Страница 116: ...piration of the commercial license the functionality of the application will be preserved except for the possibility to update its databases The application will continue to perform anti virus traffic scan background storages scan and the anti spam scan of the incoming mail but it will use outdated versions of the anti virus and content filtration databases In this case it is difficult to guarante...

Страница 117: ...the user In this case the serial number of the license key will be added to the list of cancelled license keys the so called black list If your current license key is found in the black list the backup key will not be activated and the application functionality will not be available except for the management and the anti virus database updating services In case if you find that your key is in the ...

Страница 118: ...ber of the application installed license owner information license expiration date the status of the current license key application functionality available based on the current license key o Full The application operates as provided for in the license agreement o Updates are not available The updating feature for anti virus and content filtration databases is not available The application perform...

Страница 119: ...e key is found in the black list the backup key will not be activated In this case you have to replace the current license key You can manually install the backup license key as the current key There is a provision for the replacement of the current license key that prevents the restriction of the application functionality if the replacement is performed as the consecutive procedure of the removal...

Страница 120: ...kup license key section Figure 46 View license key info Configuring license notifications 3 Specify the license key file key to be installed in the file select dialog box that will open After the trial license key is expired you will not be able to install another trial license key As a result information about the license key installed will be displayed in the fields of the corresponding section ...

Страница 121: ...e Current license key section 3 Confirm the removal of the license key in the warning message that will be displayed on your screen As a result information in the fields of the corresponding sections will be updated Close the General settings window by pressing the OK or the Apply button If you remove the current license key any installed backup key will also be automatically removed 14 4 License ...

Страница 122: ... license notification to be issued e mail address of the recipient of the notifications In order to check this e mail address send an e mail message to it by pressing the Test button Entering several e mail addresses is allowed the addresses entered must be separated by semicolons After you have entered and verified the address press the Apply or the ОК but ton 14 5 Unprotected storage areas The a...

Страница 123: ...lders storages section for those storage areas the content of which will not be scanned for viruses The list includes all storage areas of public folders created on the protected Exchange server By default they all will be pro tected In order to apply the changes press the Apply or the OK button You can restore the default settings by pressing the Restore the default set tings button As a result t...

Страница 124: ...g programs on the computer running Microsoft Exchange Server Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Network Agent and Administration Console included into the package of Kaspersky Administration Kit In this case the application will be managed locally using the Administration Console If you are planning to control the application remotely using Kaspersky Administration Kit then ...

Страница 125: ...y configure Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Update the anti virus and content filtration databases Install and remove license keys on client computers Review information about application activity on client computers Figure 47 Kaspersky Administration Kit Console When working through Kaspersky Administration Kit the program is administered by policy settings task settings...

Страница 126: ...fic to a certain task type 15 1 Managing policies This section describes how to create and manage policies of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Detailed information about managing policies is available in the administrator s manual for Kaspersky Administration Kit 15 1 1 Creating a policy To create a new policy perform the following actions 1 In the Groups folder of the con...

Страница 127: ...am you can redefine only those settings in the created group policy that are allowed to be changed by the top level policy Step 2 Enabling server protection In the Server protection dialog see Figure 48 you will be offered to define the necessary level of anti virus protection for details see section 6 1 page 49 and server protection against unwanted e mail Step 3 Configuring attachment scanning p...

Страница 128: ...2003 Figure 49 Scanning of attachments Step 4 Enabling scanning of routed mail You can use the Protected e mail dialog see Figure 50 to disable scanning of mail routed by the server in order to decrease the load on the Exchange server see section 6 4 page 56 ...

Страница 129: ...s for anti virus database and content filtration database updates specify the update source see section 5 3 page 41 configure local network settings in the window that opens when you click the Connection parameters button see section 5 4 page 43 configure settings for running updates under another user account in the window that opens when you click the Start parameters button see section 5 5 page...

Страница 130: ...group to another and handle the policies using the standard commands in the shortcut menu such as Copy Paste Cut Paste and Delete or identical commands in the Action menu 15 1 2 Viewing and editing policy settings At the editing stage you can customize policy settings prohibit their modification for nested groups and lock application and task settings so that users cannot change them 1 In the Grou...

Страница 131: ...erties for Kaspersky Security 5 5 for Microsoft Exchange Server 2003 consisting of several tabs General Enforcement and Event processing tabs are standard Kaspersky Administration Kit tabs see details in Administrator s manual for Kaspersky Administration Kit The remaining tabs display specific settings for Kaspersky Security 5 5 for Microsoft Exchange Server 2003 These tabs are described in detai...

Страница 132: ...on Date and time of the last policy modification On this tab you can edit the policy name enable or disable it or define its activation whenever specified events occur 15 1 2 2 Enabling disabling server protection You can use the Server protection tab see Figure 53 to enable disable anti virus protection of the server and protection against unwanted e mail for a group of client computers In additi...

Страница 133: ...public folders stored on the server check Enable background scan and configure the scan settings for more on background scanning see section 6 6 page 62 Figure 53 The Server protection tab 15 1 2 3 Scanning of attachments You can use the Attachment scan tab see Figure 54 to define the policy parameters that limit anti virus scanning of attached objects Configuration of these parameters is similar ...

Страница 134: ... 15 1 2 4 Scanning of routed mail You can use the Protected Mail tab see Figure 55 to enable disable scanning of mail traffic routed via an Exchange server Configuration of these parameters is similar to the case of application management via its local interface see details in section 6 4 page 56 ...

Страница 135: ... define the actions which the Kaspersky Security application will perform whenever it reveals objects containing malicious code In addition you can enable the option to create a copy of the original object in the Backup storage prior to its disinfection Configuration of these parameters is similar to the case of application management via its local interface see details in section 6 5 page 57 ...

Страница 136: ...ecurity application will perform whenever it detects messages bearing signs of spam and also to configure special markers for flagging the subject line of the message In addition you can enable the option to create a copy of the original message in the Backup storage prior to its deletion or rejection Configuration of these parameters is similar to the case of application management via its local ...

Страница 137: ... 15 1 2 7 Configuring the server protection productivity Anti Virus and Anti Spam productivity settings are configured on the Performance tab see Figure 58 These settings are configured in the same way as when configuring them through the application s own interface For more see Chapter 8 page 72 ...

Страница 138: ...ters in the window which opens after clicking the Connection parameters button and configure settings for running updates under a different user account Configuration of these parameters is similar to the case of application management via its local interface see details in sections 5 3 5 5 pages 41 45 You can configure scheduled updates to update anti virus and content filtration databases centra...

Страница 139: ...rder to create a new template click the Append button in the Notification templates section and use the resulting window to configure the notification template Configuration of these parameters is similar to the case of application management via its local interface see details in section 10 1 page 87 As soon as a new template is created it will appear in the list of notification templates see Fig...

Страница 140: ...lting window to configure the counter Configuration of these parameters is similar to the case of application management via its local interface see details in section 11 1 page 95 As soon as a new counter is created it will appear in the list of Virus outbreak counters Click the Properties button to review edit its parameters To remove a counter click the Delete 15 1 2 11 General notification set...

Страница 141: ...e 121 In addition you can define whose account will be used when sending notifications by e mail By default notifications are sent under KSE see section 10 3 page 91 Figure 61 The Notifications tab 15 1 2 12 Additional settings On the Additional tab see Figure 62 you can configure Backup settings for more see section 9 7 page 83 and settings for saving report statistics see section 12 1 page 102 ...

Страница 142: ...gistration of events on program operation on Administration Server On the Event processing tab see Figure 63 you can configure settings for recording events that occur in program operation on Kaspersky Administration Kit Administration Server and the event notification mode for the administrator or users ...

Страница 143: ...ailure Warning Informational message Events of the same type may have various importance levels depending upon the situation in which they occur Use the Events severity drop down list to specify the importance level for logged events The list below displays the types of events corresponding to the selected level For each event you can define if it should be sent to the Administration Server and yo...

Страница 144: ...cy application The Enforcement tab see Figure 64 displays the following information about the policy applied to the computers in the selected group The number of computers this policy has been assigned to The number of computers for which this policy has been enforced The number of computers for which this policy is pending The number of computers for which this policy has failed because of an err...

Страница 145: ...cation settings 1 In the Groups folder of the console tree select the folder containing the required client computer 2 In the results pane select the computer where the application settings have to be modified and use the Properties command from the right click menu or an identical option from the Action menu To configure the application parameters on the local com puter select the Local computer ...

Страница 146: ...the window are identical to similar ones in the policy configuration window see details in section 15 1 2 page 130 The section further will only describe the functionality different from the features provided for in policies Figure 65 Client computer properties dialog The Applications tab While configuring application parameters you can only redefine the values allowed for modification in the corr...

Страница 147: ...eneral information about Kaspersky Security 5 5 for Microsoft Exchange Server 2003 The upper window part contains the title of the installed application its version number installation date status running or stopped on the local computer and the information about the anti virus database status Figure 66 The application properties window The General tab ...

Страница 148: ...icense keys installed on the selected computer Figure 67 The Licenses tab 15 2 3 Start background scan Background scans of e mail saved on the server and in public folders are run on the Server protection tab see Figure 68 To start the scan check Enable background scan and assign the scan settings in the window that opens when you click the Configure button To start background scanning immediately...

Страница 149: ...d via an Exchange server and also enable disable protection of mailbox storages or public folders By default the application protects all mailbox storages and public folders existing on the protected mail server If the number of protected mailboxes exceeds the number indicated in the license you will have to purchase an additional license or exclude some mailbox storages from the protected area se...

Страница 150: ...plate is the same as the one described in section 12 1 1 page 104 To review a report select the template used to create the report in the Report templates list and select the View reports command from the right click menu In the View reports window see Figure 71 that opens select the necessary report and click the View button Doing so will launch the default system browser Its main window will con...

Страница 151: ...Application management using Kaspersky Administration Kit 151 Figure 70 The Templates and counters tab ...

Страница 152: ...ense key installation tasks when you need to extend the license to use Kaspersky Security Tasks of such type can be created not for the local computer only but also for client groups or a set of computers from different groups for more on creation and operation of local group and global tasks see the Kaspersky Administration Kit Administrator s Handbook In order to view and manage server tasks 1 I...

Страница 153: ...r Figure 72 Properties reviewing window for a client computer The Tasks tab The lower window portion contains task management buttons Click the Add button to create a new task please refer to the administrator s guide for Kaspersky Administration Kit for details on creating tasks Click the Delete button to remove a task Please note that creation and removal are only available for license key insta...

Страница 154: ...lease refer to the administrator s guide for Kaspersky Administration Kit for details Customize notification settings for the results of task performance the Notification tab Please refer to the administrator s guide for Kaspersky Administration Kit for details Figure 73 Task configuration The General tab 15 3 1 Running and stopping tasks A task will only be launched on a computer if the correspon...

Страница 155: ...ttings tab of the Task name task properties see Figure 73 window Every task type has its specific settings THE ANTI VIRUS DATABASE UPDATE TASK For an anti virus database update task you can specify the source of updates settings for running the task under a different user account and the source used for updating Available options include the updates servers of Kaspersky Lab an HTTP or FTP server o...

Страница 156: ...2003 Question Why does the application cause a certain decrease in my computer performance and impose a considerable load on the processor The process of virus detection is a purely computational mathematical task that involves analysis of structures checksum calculation and mathematical data transformation Therefore the main resource con sumed by the anti virus application is the processor time M...

Страница 157: ...happens contact the dealer you purchased your copy of Kaspersky Security application from or Kaspersky Lab Ltd directly Question Why daily updates are required Several years ago viruses distributed via floppy disks and at that time it was sufficient for computer protection to install an anti virus program and update the anti virus database from time to time Yet the recent virus outbreaks spread ov...

Страница 158: ...low methods using your Microsoft Internet Explorer settings or using custom settings In certain cases detailed below the update service may use the Microsoft Internet Explorer settings incorrectly o internet settings are not configured on your computer o Microsoft Internet Explorer settings are not available if no users are logged in o your proxy server requires authorization In this case the netw...

Страница 159: ...annot arrive at our server What should be done in such case The situation results from the application of the Reject action to one of the messages containing signs of spam and addressed to your server The problem will be resolved without additional actions when the relay server s timeout expires then receipt of the queued messages will be re sumed You can also delete the rejected message manually ...

Страница 160: ...ponding settings Macros Macros meaning OCURRENCE_NUMBER the total number of registered events PERIOD_LENGTH period length PERIOD_TYPE unit used to specify the time period seconds minutes hours days VIRUS_NAME the name of the detected virus in virus outbreak notifications used only for the One and the same virus detected several times event ACTION action performed with the object during the anti vi...

Страница 161: ...ame not defined for OLE objects and for messages OBJECT_TYPE object type message file OLE object RECV_TIME time the message was received SCANNER_VERSION application version number SCANNER_VENDOR application vendor name Kaspersky Lab SENT_REPRESENTING_NA ME displayed name for the message exchange user provided by the sender SERVER_NAME name of the server on which the object was detected when the ap...

Страница 162: ...crosoft Exchange Server 2003 Macros Macros meaning SUBMIT_TIME time the message was sent TO list of message recipients PRODUCT_NAME application name Kaspersky Security PROCESSED_TIME time the file was processed local time of the server ...

Страница 163: ...rough the Internet In addition you can send a query to Technical Support by completing a special form on the Kaspersky Lab website under Services Technical Support Send request to Kaspersky Lab support team When completing the web form be sure to leave exact information about the Kaspersky Lab product you use and registration data Try to describe your problem in the greatest detail possible In the...

Страница 164: ...ver 2003 In the next window of the web form specify your contact information Enter the security code from automatic registration and click the Send request button The Technical Support team will analyze your problem and will assist you as soon as possible ...

Страница 165: ...e latest version of the anti virus database This scan involves public folders and protected storages mailbox storage The scan may identify new viruses that were not described in the anti virus database at the time when previous scans were performed Backup copying creation of a backup copy of an object before it is processed and moving this copy into a backup storage Object stored in the backup sto...

Страница 166: ...ributes that involves its physical removal from the computer We recommend using this method for processing messages that definitely contain SPAM Before the message is deleted its copy is saved to the backup storage if this option is not disabled see section 7 2 page 67 Disinfection a method used for processing infected objects that results in full or partial restoration of data or a decision that ...

Страница 167: ...nse period is determined by the li cense key a standard license period is one year after the license key is installed After the license expires the application functionality will be re stricted M Management console a component of Kaspersky Security for Microsoft Exchange Server 2003 Management Console provides the user interface for managing the administration services of the application and for c...

Страница 168: ...vides the anti virus protection of the server protection against SPAM and updating of the anti virus and the content filtration databases as well as administration ser vices for remote management configuring and ensuring the integrity of the application and of the data stored Simple object an object subject to anti virus scan a message body or a simple attachment as for example an executable file ...

Страница 169: ...irus attack This value is of great significance in the periods of virus outbreaks as it helps the administrator timely react on the emerging threats of virus attacks Virus outbreak counter a template used to create and issue notifica tions about a virus outbreak threat The virus outbreak counter contains a set of parameters that determine the virus activity level threshold the dis tribution method...

Страница 170: ...ve protection from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step ahead of many other vendors in delivering extensive anti virus coverage for home users and corporate customers alike Years of hard work have made the company one of the top security software manufactu...

Страница 171: ...ring an on demand scan This feature considerably increases the speed of the program s operation The application creates a reliable barrier against viruses when they attempt to intrude your computer via e mail Kaspersky Anti Virus Personal performs automatic scan and disinfection of all incoming and outgoing mail sent or received using POP3 and STMP protocols and provides highly efficient detection...

Страница 172: ...is designed to safeguard a computer running any Microsoft Windows operating system It protects your computer against unauthorized access and external hacker attacks from either the Internet or the local network Kaspersky Anti Hacker monitors the TCP IP network activity of all applications running on your machine When it detects a suspicious action Kaspersky Anti Hacker blocks the suspicious applic...

Страница 173: ...am reads the list of available news channels and their content from news server of Kaspersky Lab with specified frequency The product performs the following functions It visualizes in the system tray the current status of virus activity The product allows the users to subscribe and unsubscribe from news channels It retrieves news from each subscribed channel with the specified frequency and notifi...

Страница 174: ...w proactive technologies The program provides for complex anti virus checks including Anti virus scanning of e mail traffic on the level of data transmission protocol POP3 IMAP and NNTP for incoming mail and SMTP for outgoing messages irrespectively of the mail client being used as well as disinfection of e mail databases Real time anti virus scanning of Internet traffic transferred via HTTP Anti ...

Страница 175: ...le system protection anti virus scanning of individual files directories or drives In addition the application can perform anti virus analysis exclusively for critical areas of the operating system and start up objects of Microsoft Windows Proactive protection the program performs constant monitoring of application activity and processes running in random access memory preventing dangerous changes...

Страница 176: ...mation saved both in internal memory of PDA and smartphones or on memory cards of any type on user demand anti virus monitor to intercept viruses in files that are either copied from other handhelds or are transferred using HotSync technology Kaspersky Security for PDA protects your handheld PDA from unauthorized intrusion by encrypting both access to the device and data stored on memory cards Kas...

Страница 177: ...ion You are free to choose from any of these anti virus applications according to the operating systems and applications you use Kaspersky Corporate Suite This package provides corporate networks of any size and complexity with comprehensive scalable anti virus protection The package components have been developed to protect every tier of a corporate network even in mixed computer environments Kas...

Страница 178: ...ipe out up to 95 of unwanted traffic Installed at the entrance to a network where it monitors incoming e mail traffic streams for spam Kaspersky Anti Spam acts as a barrier to unsolicited e mail The product is compatible with any mail system and can be installed on either an existing mail server or a dedicated one Kaspersky Anti Spam s high performance is ensured by daily updates to the content fi...

Страница 179: ...rotects against malware penetrating your system while web surfing and scans files downloaded from the Internet Kaspersky Anti Virus for MIMESweeper for SMTP Kaspersky Anti Virus for MIMESweeper for SMTP provides high speed antivirus scans of SMTP traffic on servers running Clearswift MIMESweeper The program is designed as a plug in for Clearswift MIMESweeper for SMTP and scans for viruses and proc...

Страница 180: ...THIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE WITH THE LEGISLATION REGARDING KASPERSKY SOFTWARE INTENDED FOR INDIVIDUAL CONSUMERS KASPERSKY ANTI VIRUS PERSONAL KASPERSKY ANTI VIRUS PERSONAL PRO KASPERSKY ANTI HACKER KASPERSKY SECURITY FOR PDA PURCHASED ON LINE FROM THE KASPERSKY LAB INTERNET WEB SITE CUSTOMER SHALL HAVE A PERIOD OF 7 WORKING DAYS A...

Страница 181: ...g hard disk CD ROM or other storage device of that Client Device This license authorizes you to make only as many back up copies of the Software as are necessary for its lawful use and solely for back up purposes provided that all such copies contain all of the Software s proprietary notices You shall maintain records of the number and location of all copies of the Software and Documentation and w...

Страница 182: ...e license you have obtained This license authorizes you to make or download such copies of the Documentation for each Client Device or seat that is licensed as are necessary for its lawful use provided that each such copy contains all of the Documentation s proprietary notices 1 3 Volume Licenses If the Software is licensed with volume license terms specified in the applicable product invoicing or...

Страница 183: ...e anti virus database b Free software updates including version upgrades c Extended technical support via e mail and phone hotline provided by Vendor and or Reseller d Virus detection and disinfection updates 24 hours per day 4 Ownership Rights The Software is protected by copyright laws Kaspersky Lab and its suppliers own and retain all rights titles and interests in and to the Software including...

Страница 184: ...e without the consent of Kaspersky Lab b use the Software in a manner for which it was not intended or c use the Software other than as permitted under this Agreement vi The warranties and conditions stated in this Agreement are in lieu of all other conditions warranties or other terms concerning the supply or purported supply of failure to supply or delay in supplying the Software or the Document...

Страница 185: ...ween you and Kaspersky Lab whether oral or in writing which have been given or may be implied from anything written or said in negotiations between us or our representatives prior to this Agreement and all prior agreements between the parties relating to the matters aforesaid shall cease to have effect as from the Effective Date Save as provided in paragraphs ii iii below you shall not have any re...

Отзывы: