background image

Appendix E 

183

 

(i) Kaspersky Lab will provide you with the support services ("Support Services") 
as defined below for a period of one year following: 

(a) Payment of its then current support charge, and: 

(b) Successful completion of the Support Services Subscription Form as 
provided to you with this Agreement or as available on the Kaspersky Lab 
website, which will require you to produce the Key Identification File which will 
have been provided to you by Kaspersky Lab with this Agreement. It shall be at 
the absolute discretion of Kaspersky Lab whether or not you have satisfied this 
condition for the provision of Support Services. 

(ii) Support Services will terminate unless renewed annually by payment of the 
then-current annual support charge and by successful completion of the Support 
Services Subscription Form again. 

(iii) By completion of the Support Services Subscription Form you consent to the 
terms of the Kaspersky Lab Privacy Policy, which is deposited on 
ww.kaspersky.com/privacy, and you explicitly consent to the transfer of data to 
other countries outside your own as set out in the Privacy Policy. 

(iv) "Support Services" means: 

(a) Daily updates of the anti-virus database; 

(b) Free software updates, including version upgrades; 

(c) Extended technical support via e-mail and phone hotline provided by Vendor 
and/or Reseller; 

(d) Virus detection and disinfection updates 24 hours per day. 

4. Ownership Rights. The Software is protected by copyright laws. Kaspersky 
Lab and its suppliers own and retain all rights, titles and interests in and to the 
Software, including all copyrights, patents, trademarks and other intellectual 
property rights therein. Your possession, installation, or use of the Software does 
not transfer any title to the intellectual property in the Software to you, and you 
will not acquire any rights to the Software except as expressly set forth in this 
Agreement. 

5. Confidentiality. You agree that the Software and the Documentation, including 
the specific design and structure of individual programs and the Key Identification 
File, constitute confidential proprietary information of Kaspersky Lab. You shall 
not disclose, provide, or otherwise make available such confidential information 
in any form to any third party without the prior written consent of Kaspersky Lab. 
You shall implement reasonable security measures to protect such confidential 
information, but without limitation to the foregoing shall use best endeavours to 
maintain the security of the Key Identification File. 

6. Limited Warranty. 

Содержание SECURITY 5.5 - FOR MICROSOFT EXCHANGE SERVER...

Страница 1: ...KASPERSKY LAB Kaspersky Security 5 5 for Microsoft Exchange Server 2003 ADMINISTRATOR S GUIDE...

Страница 2: ...K A S P E R S K Y S E C U R I T Y 5 5 F O R M I C R O S O F T E X C H A N G E S E R V E R 2 0 0 3 Administrator s Guide Kaspersky Lab http www kaspersky com Revision date November 2006...

Страница 3: ...peration on a cluster of servers 18 CHAPTER 3 INSTALLING UPDATING AND REMOVING THE APPLICATION 20 3 1 Installing the application 20 3 1 1 First time installation 21 3 1 2 Reinstalling the application...

Страница 4: ...3 Scanning attachments 53 6 4 Scanning of routed e mail traffic 56 6 5 Selecting actions to be performed with objects 57 6 6 Background scan 62 CHAPTER 7 ANTI SPAM PROTECTION 65 7 1 Enabling disabling...

Страница 5: ...uring log settings 114 CHAPTER 14 LICENSE KEYS 115 14 1 License information 117 14 2 Installing the license key 119 14 3 Removing a license key 121 14 4 License related notifications 121 14 5 Unprotec...

Страница 6: ...tings 145 15 2 1 Reviewing the information about application 147 15 2 2 Reviewing the license key information 148 15 2 3 Start background scan 148 15 2 4 Selection of protected storage 149 15 2 5 View...

Страница 7: ...il servers fill mailboxes with unwanted messages cause the loss of working time and inflict serious financial losses Additionally it is to be noted that the newest malicious programs use the so called...

Страница 8: ...they do not infect other programs or data Trojans are not capable of independently penetrating computers Their users spread them under the guise of useful software The damage that they incur can excee...

Страница 9: ...er to compile a list of the software installed on the computer gather information on the quality of the connection bandwidth modem speed etc Jokes Software that does not do any direct damage but displ...

Страница 10: ...pam can be roughly divided into four categories Formal messages messages that are automatically generated and sent to recipients by automated mail program functions as for example notifications of und...

Страница 11: ...e application allows generation of reports using templates with a preset level of detail and at a required interval detecting virus outbreaks as they emerge and notifying about such events The applica...

Страница 12: ...and other service folders 1 4 Software system requirements Requirements to protected server Microsoft Windows Server 2000 with Service Pack 4 installed or higher Microsoft Windows 2000 Advanced Server...

Страница 13: ...at the envelope with the installation CD remained sealed By opening the envelope containing the installation CD or by installing the product on your computer you accept all terms and conditions of the...

Страница 14: ...ns used in the text Format feature Meaning Usage Bold font Titles of menus menu items windows dialog boxes and their elements etc Note Additional information notes Attention Information requiring spec...

Страница 15: ...the server and the content of all public folders are scanned each time the anti virus database is updated or according to the schedule The scan may identify new viruses that were not described in the...

Страница 16: ...Microsoft Exchange Server via SMTP protocol and forwards them to the anti spam scan subsystem Anti spam Scan Subsystem scans e mail messages for spam This feature is implemented as a Microsoft Windows...

Страница 17: ...is not installed the applica tion will function within the default limitations and using the default settings see section 4 6 page 33 The server protection against malicious programs and SPAM will be...

Страница 18: ...f servers Kaspersky Security 5 5 for Microsoft Exchange Server 2003 does not fully support the cluster technology however it will function correctly on a cluster of servers treating each node as a sep...

Страница 19: ...0 When adding managed servers and configuring connection of Management Console to the Server use the names of physical servers on which the Security Server is installed The use of a virtual Exchange s...

Страница 20: ...tion components of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Security Server and Management Console This configuration is recommended at the initial stage of creating the Exchange serv...

Страница 21: ...r Microsoft Exchange Server 2003 If Microsoft Exchange Server is not installed on your computer or if its version does not meet the software requirements a warning will be displayed on your screen In...

Страница 22: ...nditions contained therein to proceed with the installation Step 4 Selecting the type of the installation In the dialog for setup type selection specify whether both application components Security Se...

Страница 23: ...nstallation Step 6 Enabling server protection In the Server protection window you will be offered to enable automatically the anti virus protection and server protection against spam immediately after...

Страница 24: ...personal key that contains all service information required for the full featured functionality of the application namely support information who is providing support and how you can get help restrict...

Страница 25: ...you to confirm stopping the Microsoft Exchange Information Store and the Microsoft Internet Information services Agree to stop these services to let the uninstallation process complete its work corre...

Страница 26: ...Microsoft Windows menu This programs group is cre ated only on the administrator s workstations when the Management Con sole is installed 4 2 Application interface The user interface of the applicatio...

Страница 27: ...ral settings used for viewing general application s operation settings license details and information about installed license keys renewing the license and configuring the application operation diagn...

Страница 28: ...about detected outbreaks 4 2 2 Shortcut menu Each category of objects in the console tree has its own shortcut menu that opens after right clicking an object with the mouse In addition to standard MMC...

Страница 29: ...for creating reports Virus outbreak counters New counter Create and configure a new criterion to be used for identifying a virus outbreak and settings to be used for notification about such outbreak A...

Страница 30: ...5 5 for Microsoft Exchange Server 2003 node in the console tree open the shortcut menu and select the Add server command or a similar item from the Action menu This will open the Add server window see...

Страница 31: ...include nested folders Notification templates Backup storage Report templates and Virus outbreak counters If the connection has not been established or could not be established you can connect to suc...

Страница 32: ...o it In this case working with the same server from several consoles you should regularly update information on each console In order to do this use the Refresh command available via the shortcut menu...

Страница 33: ...the object and if disinfection is impossible the application deletes the object and replaces it with a text file containing a notification in the following format Malicious object VIRUS_NAME has been...

Страница 34: ...or messaged that do not contain SPAM are detected these messages will be delivered intact to the Inbox of the user s e mail client when a suspicious message which possibly contains SPAM or message con...

Страница 35: ...the EICAR organization at http www eicar org anti_virus_test_file htm If you have no Internet connection you can create your own test virus To create a test virus type the following string in any text...

Страница 36: ...umn lists prefixes to be added at the beginning of the string of the standard test virus for example DELE X5O P AP 4 PZX54 P 7CC 7 EICAR STANDARD ANTIVIRUS TEST FILE H H After adding a prefix to the t...

Страница 37: ...lication 37 When such message arrives at Exchange Server Kaspersky Security will assign it SPAM status and will process it applying the action specified for this type of objects by the administrator s...

Страница 38: ...important to keep you databases up to date We recom mend that you update your databases immediately after your application is installed because the databases included into the distribution kit will b...

Страница 39: ...ee section 5 2 page 40 specify the updates source see section 5 3 page 41 configure the network connection settings see section 5 2 page 40 You can setup different updates parameters for the anti viru...

Страница 40: ...n The application will launch the updating process using the selected settings 5 2 Automatic updates In order to update the database in the automatic mode 1 In the main application window select the K...

Страница 41: ...rent modes for updating the anti virus and the content filtration databases In order to do this check the Allow different anti virus and anti spam settings box This will divide the schedule setup wind...

Страница 42: ...n the Updates window that will open see Figure 6 and specify the updates source required Updates servers of Kaspersky Lab Kaspersky Lab s HTTP and FTP internet servers where new updates are uploaded e...

Страница 43: ...crosoft Exchange Server 2003 node in the console tree open it select the node corresponding to the server you need and follow the Updates link in the results pane 2 Switch to the Network Settings tab...

Страница 44: ...e Connection timeout sec field If the connection was not established within the specified time limit the application will attempt to establish connection to the next update server until the connection...

Страница 45: ...xy server You can use this feature to run updates with another profile that has those rights To configure an update to start under a different user profile 1 In the main program window select Kaspersk...

Страница 46: ...46 Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Figure 8 Configuring update settings The Startup options tab...

Страница 47: ...and the E mail Interceptor analyzes the mail traffic received from the Exchange server and transfers it to the Anti Virus Scan Subsystem The Anti Virus Scan Subsystem processes e mail messages based...

Страница 48: ...ched files of any format It is to be noted that Kaspersky Security differentiates between simple objects an executable file a message with a simple attachment and containers consisting of several obje...

Страница 49: ...ts through the mail server All currently known malicious programs Programs that do not contain malicious code as it is commonly under stood but may impose a moral threat inflict financial damage or fa...

Страница 50: ...legal software that may work in a way that can be viewed by the application as a behavior characteristic of malicious or potentially dangerous software Examples of such software are backdoor and remo...

Страница 51: ...d storage scan will be performed In order to enable or disable the anti virus protection or change anti virus protection level 1 Select the node corresponding to the server you need in the console tre...

Страница 52: ...ore the default settings by pressing the Restore the default settings button In order to apply the changes press the Apply or the OK button The anti virus protection will then be enabled or disabled i...

Страница 53: ...us mail protection using the Management Console see above 3 Enable the anti spam server protection using the Management Console see section 7 1 page 66 6 3 Scanning attachments In order to decrease th...

Страница 54: ...ield to the right Since archives are one of the types of containers the restric tions applied to the scan of archives and containers are inter related If you impose a restriction to the scan of contai...

Страница 55: ...o tx all files with mask tx o test all files with name test Figure 11 Specifying the masks for files to be excluded from the scan scope Files defined by type Using the Append and Remove buttons creat...

Страница 56: ...ed and follow the Anti virus protection link in the results pane 2 Go to the Protected Mail see Figure 13 tab in the Anti virus protection window that will open 3 Check the Do not scan routed mail box...

Страница 57: ...ach object can be assigned a status as listed below Not infected object does not contain viruses Infected object contains at least one of the known viruses Suspicious object s code is similar to the c...

Страница 58: ...e name change affects attached objects only if a virus was detected in the message body no renaming is performed Replace infected objects with text delete the detected object and replace it with text...

Страница 59: ...made no changes You must save the message In order to define the rules for processing objects detected during an anti virus scan 1 Select the node corresponding to the server you need in the console t...

Страница 60: ...values A detailed description of the option selected in the table is provided in the bottom part of the window The further steps will depend on the selection you have made In order to continue using t...

Страница 61: ...pied to the message body and into the replacement txt file Create a replacement template In order to do this enter the mes sage text into the wizard window The text of this notification may include in...

Страница 62: ...plication scans the body of the message and attached files in accordance with the general settings of the anti virus scan If background storage scan is disabled e mail messaged stored on the server wi...

Страница 63: ...ked by default and specify the desired scan launch option Every time the anti virus database is updated launch the scan every time the anti virus database is updated According to schedule launch the s...

Страница 64: ...e scan immediately press the Start now button Figure 18 4 You can restrict the scan time In order to do this check the Stop scan in NN hours box and specify the desired time period in hours After this...

Страница 65: ...ge attributes the sender s and the recipient s addresses message size headers including the From and the To headers Secondly anti spam content filtration is used to analyze the content of the message...

Страница 66: ...n 7 2 page 67 7 1 Enabling disabling anti spam protection In order to enable disable anti spam protection 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Serv...

Страница 67: ...2003 start function manually through Manage computer Services see section 6 2 page 51 7 2 Selecting the action to be performed with the message In order to select an action to be performed with a mes...

Страница 68: ...t are carried out after the action Move to the Junk E mail folder For example if the rule requires automatic deletion of all messages from the Junk E mail folder then the message will be deleted No co...

Страница 69: ...e see Chapter 6 page 47 If necessary you can restore the message from the backup storage or forward it to recipients unchanged If you do not want copies to be saved uncheck the Save a copy of the orig...

Страница 70: ...to do this enter the appropriate values in the TCIP IP settings section in the Advanced tab of the Anti Spam protection window see Figure 23 Figure 23 Configuring anti spam protection settings The Ad...

Страница 71: ...bal Settings node select Message Delivery and select Properties from the context menu 3 In the window that opens select the Connection filtering tab You can read more about creating configuring and ap...

Страница 72: ...e open it select the node corresponding to the server you need and follow the Anti virus protection link in the results pane 2 Go to the Additional settings tab in the Anti virus protection window see...

Страница 73: ...the node corresponding to the server you need and follow the Anti Spam protection link in the results pane 2 Go to the Advanced tab in the Anti Spam protection window see Figure 23 that will open and...

Страница 74: ...t it and maintain the integrity of the data in it see section 9 4 page 81 sent to recipients unchanged only for e mails deleted or rejected by a spam scan For more see section 9 4 page 81 A backup cop...

Страница 75: ...g the managed Exchange server For convenient viewing and searching for data in the backup storage and for data structuring purposes a custom filters configuration capability is provided details see se...

Страница 76: ...ed to the object as a result of an anti virus scan see section 6 5 page 57 or anti spam scan details see Chapter 7 page 65 The application places into the backup storage a copy of an object before thi...

Страница 77: ...n be used for example to search for objects that must be restored In order to create a backup storage filter 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange S...

Страница 78: ...e attributes o file type E mails may be filtered by type Message result of spam scan Message Body Attachment result of anti virus scan or all types together o object name only available if you select...

Страница 79: ...der When the filter is selected in the console tree only data that complies with the filter criterion will be displayed in the results pane Later on you can alter the values of filter parameters or de...

Страница 80: ...removed from the backup storage Objects that meet the filter parameters will still be available in the Backup Storage folder 9 3 Restoring objects from the backup storage In order to restore an objec...

Страница 81: ...hat the e mail will not be sent to the recipients listed in the Cc field To send an e mail to its recipients 1 In the main program window select Kaspersky Security 5 5 for Microsoft Exchange Server 20...

Страница 82: ...m which the control is maintained 9 6 Deleting objects from the backup storage The following objects are automatically deleted from the backup storage older objects if there is a restriction imposed o...

Страница 83: ...nstallation of the Security Server component The settings of the backup storage are determined by default and can be altered by the administrator In order to modify the backup storage parameters 1 Sel...

Страница 84: ...omatically based on the application restriction selected Please note that objects cannot be transferred from the old backup storage to the new backup directory To set a restriction on the size of the...

Страница 85: ...ited by default specify the number of days in the entry field the default value is 30 days If the size of the backup storage does not need to be restricted deselect the Auto delete objects from storag...

Страница 86: ...ssages sent are created by the administrator in the form of a notification template When a certain event occurs an automatic notification of the corresponding type is issued based on such template Sev...

Страница 87: ...rs of the existing templates and rename or delete templates using the shortcut menu commands In order to enable notification about objects detected during scan 1 Create a notification template see sec...

Страница 88: ...actions on the General tab see Figure 29 Figure 29 Notification template The General tab Enter the template name in the Name field Specify the notification type It must match the event which would tr...

Страница 89: ...escription of the macros in the list is provided in Appendix A page 160 Figure 30 Notification template The Text tab Select the notification method and specify the corresponding parameter values in th...

Страница 90: ...he computers recipients in the Computers recipients field IP address or NetBIOS computer name can be used as the computer ad dress Entering several addresses is allowed the addresses entered must be s...

Страница 91: ...y they were specified when the notification was created details see section 10 1 page 87 After you have made the changes press the OK or the Apply buttons to apply changes To exit without savings the...

Страница 92: ...will open the General settings window where you should select the Advanced see Figure 32 tab Enter the information that will be displayed as the sender of messages generated by Kaspersky Security in...

Страница 93: ...cified type within a certain limited time interval If the virus activity level is greater than the specified threshold a notification will be issued Notifications can be delivered using the following...

Страница 94: ...This folder is included into the structure of each node reflecting the managed Exchange server The list of the virus outbreak counters created is displayed in the form of a table in the results pane s...

Страница 95: ...al tab of the virus outbreak counter settings see Figure 34 11 1 Creating a new virus outbreak counter In order to create a new virus outbreak counter 1 Select the Virus outbreak counters folder in th...

Страница 96: ...hreshold In order to do this specify the values for the settings in the Frequency group using the following order maximum allowable number of events of the specified type time period during which thes...

Страница 97: ...l be used as a header of the message Create the message text in the Full notification text field The message may include information about a registered event To include this information add correspond...

Страница 98: ...ns In order to send messages via network using the Net Send service check the Network notification using Net Send box and specify the addresses of the computers recipients in the Computers recipients...

Страница 99: ...Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary server and select the Virus outbreak counters folder in the console tree 2 Select the cou...

Страница 100: ...ny other folder selected by the administrator can be used as the report storage details see section 12 1 2 page 107 Reports sent by e mail are files in HTML format sent by e mail as attachments The me...

Страница 101: ...eated according to the schedule or by request expected creation of the next report is expected based on the schedule disabled report generation is disabled for this template Detailed information about...

Страница 102: ...upon request 1 In the main application window select the Kaspersky Security 5 5 for Microsoft Exchange Server 2003 node in the console tree open it select the node corresponding to the necessary serve...

Страница 103: ...d or the analogous command under the Action menu 3 In the Report templates Properties window that will open see Figure 38 Figure 38 Configuring report settings Check the Keep report statistics box to...

Страница 104: ...node corresponding to the server you need and select the Report templates folder in the console tree 2 Open the shortcut menu and use the New template command or the analogous command under the Action...

Страница 105: ...the reporting period select For the last option in the Reporting period group and specify the interval and the time unit hours days weeks months specify exact date for the beginning and the end of th...

Страница 106: ...n specify the folder where reports will be saved By default the Re ports folder located on the server in the application installation folder will be used for storing the reports You can specify a diff...

Страница 107: ...he table in the results pane If the Create a report box in the General tab is checked the application will create reports according to the time specified in the schedule and with the specified frequen...

Страница 108: ...template settings assigned created reports can be saved in the form of a folder sent by e mail as an attachment to a message In order to view a report saved as a folder 1 Enter the folder where the lo...

Страница 109: ...der to view a particular section select its name in the table of contents and the content of the section will be loaded in the right frame In order to view the report delivered by e mail open index ht...

Страница 110: ...the sections including the information they contain The sections are arranged in the same order as they are listed in the table of contents The structure and the content of the sections are identical...

Страница 111: ...formats and depending on the format the naming conventions for the log files may be as follows kavscmesrvDATE log main application s event log where information pertaining to anti virus protection is...

Страница 112: ...ified in the Diagnostics tab of the application settings window General settings see Figure 44 This window is accessible via the General settings link 13 1 Configuring the diagnostics level The amount...

Страница 113: ...ght part of the table contains the list of components included into the selected module and the diagnostics level for each component Select the module in the left part of the table and then select the...

Страница 114: ...eral settings window that will open see Figure 44 Enter the path to the new folder in the Server folder for log files field Select the frequency for creating logs in the Start a new log file every fie...

Страница 115: ...ort on issues related to the installation configuration and the use of the purchased software product provided 24 hours a day by phone or via email the possibility to send suspicious objects to Kasper...

Страница 116: ...iration of the commercial license the functionality of the application will be preserved except for the possibility to update its databases The application will continue to perform anti virus traffic...

Страница 117: ...he user In this case the serial number of the license key will be added to the list of cancelled license keys the so called black list If your current license key is found in the black list the backup...

Страница 118: ...er of the application installed license owner information license expiration date the status of the current license key application functionality available based on the current license key o Full The...

Страница 119: ...key is found in the black list the backup key will not be activated In this case you have to replace the current license key You can manually install the backup license key as the current key There i...

Страница 120: ...up license key section Figure 46 View license key info Configuring license notifications 3 Specify the license key file key to be installed in the file select dialog box that will open After the trial...

Страница 121: ...Current license key section 3 Confirm the removal of the license key in the warning message that will be displayed on your screen As a result information in the fields of the corresponding sections w...

Страница 122: ...e license notification to be issued e mail address of the recipient of the notifications In order to check this e mail address send an e mail message to it by pressing the Test button Entering several...

Страница 123: ...ders storages section for those storage areas the content of which will not be scanned for viruses The list includes all storage areas of public folders created on the protected Exchange server By def...

Страница 124: ...programs on the computer running Microsoft Exchange Server Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Network Agent and Administration Console included into the package of Kaspersky Ad...

Страница 125: ...configure Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Update the anti virus and content filtration databases Install and remove license keys on client computers Review information about...

Страница 126: ...ic to a certain task type 15 1 Managing policies This section describes how to create and manage policies of Kaspersky Security 5 5 for Microsoft Exchange Server 2003 Detailed information about managi...

Страница 127: ...m you can redefine only those settings in the created group policy that are allowed to be changed by the top level policy Step 2 Enabling server protection In the Server protection dialog see Figure 4...

Страница 128: ...003 Figure 49 Scanning of attachments Step 4 Enabling scanning of routed mail You can use the Protected e mail dialog see Figure 50 to disable scanning of mail routed by the server in order to decreas...

Страница 129: ...for anti virus database and content filtration database updates specify the update source see section 5 3 page 41 configure local network settings in the window that opens when you click the Connecti...

Страница 130: ...roup to another and handle the policies using the standard commands in the shortcut menu such as Copy Paste Cut Paste and Delete or identical commands in the Action menu 15 1 2 Viewing and editing pol...

Страница 131: ...rties for Kaspersky Security 5 5 for Microsoft Exchange Server 2003 consisting of several tabs General Enforcement and Event processing tabs are standard Kaspersky Administration Kit tabs see details...

Страница 132: ...n Date and time of the last policy modification On this tab you can edit the policy name enable or disable it or define its activation whenever specified events occur 15 1 2 2 Enabling disabling serve...

Страница 133: ...ublic folders stored on the server check Enable background scan and configure the scan settings for more on background scanning see section 6 6 page 62 Figure 53 The Server protection tab 15 1 2 3 Sca...

Страница 134: ...15 1 2 4 Scanning of routed mail You can use the Protected Mail tab see Figure 55 to enable disable scanning of mail traffic routed via an Exchange server Configuration of these parameters is similar...

Страница 135: ...define the actions which the Kaspersky Security application will perform whenever it reveals objects containing malicious code In addition you can enable the option to create a copy of the original ob...

Страница 136: ...curity application will perform whenever it detects messages bearing signs of spam and also to configure special markers for flagging the subject line of the message In addition you can enable the opt...

Страница 137: ...15 1 2 7 Configuring the server protection productivity Anti Virus and Anti Spam productivity settings are configured on the Performance tab see Figure 58 These settings are configured in the same way...

Страница 138: ...ers in the window which opens after clicking the Connection parameters button and configure settings for running updates under a different user account Configuration of these parameters is similar to...

Страница 139: ...der to create a new template click the Append button in the Notification templates section and use the resulting window to configure the notification template Configuration of these parameters is simi...

Страница 140: ...ting window to configure the counter Configuration of these parameters is similar to the case of application management via its local interface see details in section 11 1 page 95 As soon as a new cou...

Страница 141: ...121 In addition you can define whose account will be used when sending notifications by e mail By default notifications are sent under KSE see section 10 3 page 91 Figure 61 The Notifications tab 15...

Страница 142: ...istration of events on program operation on Administration Server On the Event processing tab see Figure 63 you can configure settings for recording events that occur in program operation on Kaspersky...

Страница 143: ...ilure Warning Informational message Events of the same type may have various importance levels depending upon the situation in which they occur Use the Events severity drop down list to specify the im...

Страница 144: ...y application The Enforcement tab see Figure 64 displays the following information about the policy applied to the computers in the selected group The number of computers this policy has been assigned...

Страница 145: ...ation settings 1 In the Groups folder of the console tree select the folder containing the required client computer 2 In the results pane select the computer where the application settings have to be...

Страница 146: ...he window are identical to similar ones in the policy configuration window see details in section 15 1 2 page 130 The section further will only describe the functionality different from the features p...

Страница 147: ...neral information about Kaspersky Security 5 5 for Microsoft Exchange Server 2003 The upper window part contains the title of the installed application its version number installation date status runn...

Страница 148: ...cense keys installed on the selected computer Figure 67 The Licenses tab 15 2 3 Start background scan Background scans of e mail saved on the server and in public folders are run on the Server protect...

Страница 149: ...via an Exchange server and also enable disable protection of mailbox storages or public folders By default the application protects all mailbox storages and public folders existing on the protected m...

Страница 150: ...late is the same as the one described in section 12 1 1 page 104 To review a report select the template used to create the report in the Report templates list and select the View reports command from...

Страница 151: ...Application management using Kaspersky Administration Kit 151 Figure 70 The Templates and counters tab...

Страница 152: ...nse key installation tasks when you need to extend the license to use Kaspersky Security Tasks of such type can be created not for the local computer only but also for client groups or a set of comput...

Страница 153: ...Figure 72 Properties reviewing window for a client computer The Tasks tab The lower window portion contains task management buttons Click the Add button to create a new task please refer to the admin...

Страница 154: ...ease refer to the administrator s guide for Kaspersky Administration Kit for details Customize notification settings for the results of task performance the Notification tab Please refer to the admini...

Страница 155: ...tings tab of the Task name task properties see Figure 73 window Every task type has its specific settings THE ANTI VIRUS DATABASE UPDATE TASK For an anti virus database update task you can specify the...

Страница 156: ...003 Question Why does the application cause a certain decrease in my computer performance and impose a considerable load on the processor The process of virus detection is a purely computational mathe...

Страница 157: ...appens contact the dealer you purchased your copy of Kaspersky Security application from or Kaspersky Lab Ltd directly Question Why daily updates are required Several years ago viruses distributed via...

Страница 158: ...ow methods using your Microsoft Internet Explorer settings or using custom settings In certain cases detailed below the update service may use the Microsoft Internet Explorer settings incorrectly o in...

Страница 159: ...nnot arrive at our server What should be done in such case The situation results from the application of the Reject action to one of the messages containing signs of spam and addressed to your server...

Страница 160: ...onding settings Macros Macros meaning OCURRENCE_NUMBER the total number of registered events PERIOD_LENGTH period length PERIOD_TYPE unit used to specify the time period seconds minutes hours days VIR...

Страница 161: ...me not defined for OLE objects and for messages OBJECT_TYPE object type message file OLE object RECV_TIME time the message was received SCANNER_VERSION application version number SCANNER_VENDOR applic...

Страница 162: ...rosoft Exchange Server 2003 Macros Macros meaning SUBMIT_TIME time the message was sent TO list of message recipients PRODUCT_NAME application name Kaspersky Security PROCESSED_TIME time the file was...

Страница 163: ...ough the Internet In addition you can send a query to Technical Support by completing a special form on the Kaspersky Lab website under Services Technical Support Send request to Kaspersky Lab support...

Страница 164: ...er 2003 In the next window of the web form specify your contact information Enter the security code from automatic registration and click the Send request button The Technical Support team will analyz...

Страница 165: ...latest version of the anti virus database This scan involves public folders and protected storages mailbox storage The scan may identify new viruses that were not described in the anti virus database...

Страница 166: ...ibutes that involves its physical removal from the computer We recommend using this method for processing messages that definitely contain SPAM Before the message is deleted its copy is saved to the b...

Страница 167: ...e period is determined by the li cense key a standard license period is one year after the license key is installed After the license expires the application functionality will be re stricted M Manage...

Страница 168: ...ides the anti virus protection of the server protection against SPAM and updating of the anti virus and the content filtration databases as well as administration ser vices for remote management confi...

Страница 169: ...rus attack This value is of great significance in the periods of virus outbreaks as it helps the administrator timely react on the emerging threats of virus attacks Virus outbreak counter a template u...

Страница 170: ...e protection from current and future threats Resistance to future attacks is the basic policy implemented in all Kaspersky Lab s products At all times the company s products remain at least one step a...

Страница 171: ...ing an on demand scan This feature considerably increases the speed of the program s operation The application creates a reliable barrier against viruses when they attempt to intrude your computer via...

Страница 172: ...s designed to safeguard a computer running any Microsoft Windows operating system It protects your computer against unauthorized access and external hacker attacks from either the Internet or the loca...

Страница 173: ...m reads the list of available news channels and their content from news server of Kaspersky Lab with specified frequency The product performs the following functions It visualizes in the system tray t...

Страница 174: ...proactive technologies The program provides for complex anti virus checks including Anti virus scanning of e mail traffic on the level of data transmission protocol POP3 IMAP and NNTP for incoming ma...

Страница 175: ...e system protection anti virus scanning of individual files directories or drives In addition the application can perform anti virus analysis exclusively for critical areas of the operating system and...

Страница 176: ...ation saved both in internal memory of PDA and smartphones or on memory cards of any type on user demand anti virus monitor to intercept viruses in files that are either copied from other handhelds or...

Страница 177: ...on You are free to choose from any of these anti virus applications according to the operating systems and applications you use Kaspersky Corporate Suite This package provides corporate networks of an...

Страница 178: ...pe out up to 95 of unwanted traffic Installed at the entrance to a network where it monitors incoming e mail traffic streams for spam Kaspersky Anti Spam acts as a barrier to unsolicited e mail The pr...

Страница 179: ...otects against malware penetrating your system while web surfing and scans files downloaded from the Internet Kaspersky Anti Virus for MIMESweeper for SMTP Kaspersky Anti Virus for MIMESweeper for SMT...

Страница 180: ...HIS AGREEMENT DO NOT BREAK THE CD s SLEEVE DOWNLOAD INSTALL OR USE THIS SOFTWARE IN ACCORDANCE WITH THE LEGISLATION REGARDING KASPERSKY SOFTWARE INTENDED FOR INDIVIDUAL CONSUMERS KASPERSKY ANTI VIRUS...

Страница 181: ...hard disk CD ROM or other storage device of that Client Device This license authorizes you to make only as many back up copies of the Software as are necessary for its lawful use and solely for back...

Страница 182: ...license you have obtained This license authorizes you to make or download such copies of the Documentation for each Client Device or seat that is licensed as are necessary for its lawful use provided...

Страница 183: ...anti virus database b Free software updates including version upgrades c Extended technical support via e mail and phone hotline provided by Vendor and or Reseller d Virus detection and disinfection...

Страница 184: ...without the consent of Kaspersky Lab b use the Software in a manner for which it was not intended or c use the Software other than as permitted under this Agreement vi The warranties and conditions s...

Страница 185: ...een you and Kaspersky Lab whether oral or in writing which have been given or may be implied from anything written or said in negotiations between us or our representatives prior to this Agreement and...

Отзывы: