Kaspersky Endpoint Security for Linux

Contents

[Topic 245017]

Kaspersky Endpoint Security 12.0 for Linux

This intended audience of this Help are technical professionals responsible for installing and administering the Kaspersky Endpoint Security application, as well as supporting organizations that use Kaspersky Endpoint Security. This Help is intended for professionals who are familiar with operating systems and Linux, have mastered the basic techniques of managing them, and have experience using the Kaspersky Security Center remote centralized management system for Kaspersky applications.

Kaspersky Endpoint Security 12.0 for Linux ("Kaspersky Endpoint Security", "application") protects devices running Linux operating systems against various types of threats, including network and scam attacks. You can use Kaspersky Endpoint Security as part of Kaspersky Security for Virtualization Light Agent to protect virtual machines running Linux guest operating systems.

The application is not intended for use in industrial processes involving automated control systems. To protect devices in these systems, we recommend using Kaspersky Industrial CyberSecurity for Linux Nodes.

The application is used to:

Additional features are provided to keep the application up to date and extend the functionality of the application. The application is used to:

You can manage Kaspersky Endpoint Security using the following methods:

The update functionality (including anti-virus signature updates and code base updates), as well as the KSN functionality may not be available in the application in the territory of the USA.

In this Help section

About Kaspersky Endpoint Security usage modes

Distribution kit

Hardware and software requirements

Page top

[Topic 93769]

About Kaspersky Endpoint Security usage modes

You can use Kaspersky Endpoint Security in one of the following modes:

  • Standalone. Kaspersky Endpoint Security is used as a standalone application for protecting devices running Linux operating systems.
  • In Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent). Kaspersky Endpoint Security is used as the component of the Kaspersky Hybrid Cloud Security for Virtualization Light Agent solution to protect virtual machines running Linux guest operating systems.

The application is used in standalone mode by default.

If you want to use the application in Light Agent mode, you need to do the following:

  1. Install Kaspersky Endpoint Security on each virtual machine that needs to be protected using Kaspersky Hybrid Cloud Security for Virtualization Light Agent. You can also install the application on a virtual machine template.

    During installation, you need to specify in one of the following ways that the application will be used in Light Agent mode:

    After Kaspersky Endpoint Security is installed, you cannot change the application usage mode.

    When selecting Light Agent mode, you can also configure the following settings for Kaspersky Endpoint Security in Light Agent mode:

    • The role of the virtual machine that you want to protect, in the virtual infrastructure: server or workstation. The role of a virtual machine determines the license under which the application will be used on this virtual machine as well as the available functionality.
    • VDI protection mode. It is recommended to enable this mode if you are installing the application on a virtual machine template that will be used to create temporary virtual machines. VDI protection mode optimizes the operation of Kaspersky Endpoint Security on temporary virtual machines.
  2. Configure the settings for connecting Light Agent to and the settings for connecting Light Agent to the .

    Kaspersky Endpoint Security in Light Agent mode interacts with other components of the Kaspersky Hybrid Cloud Security for Virtualization Light Agent solution: the Integration Server and the Protection Server installed on the SVM (for more information, see the Kaspersky Endpoint Security for Virtualization Light Agent Help). To interact with the Protection Server, Kaspersky Endpoint Security establishes and maintains a connection to the SVM on which this Protection Server is installed.

    A connection to the Integration Server is required if you want Light Agents to receive information about the SVM through the Integration Server, or if you want to protect the connection between the Protection Server and the Light Agent.

    You can configure the connection settings in a Kaspersky Endpoint Security policy using Kaspersky Security Center Administration Console or using Kaspersky Security Center Web Console.

You can obtain information about application operation in Light Agent mode, as well as information about the connection to the Integration Server and SVMs, by using the following commands: --ksvla-info, --viis-info, and --svm-info.

Information about the application usage mode is displayed in Kaspersky Security Center in the properties of Kaspersky Endpoint Security on the managed device in the Components section. Information is displayed in the Light Agent mode for protecting virtual environments line as follows:

  • The Running status means that the application is being used in Light Agent mode;
  • The Not installed status means that the application is being used in standalone mode.

About activating the application in Light Agent mode

If Kaspersky Endpoint Security is used in Light Agent mode, the application does not need to be activated separately. You activate Kaspersky Hybrid Cloud Security for Virtualization Light Agent; activation is performed on the Protection Server (a component of Kaspersky Hybrid Cloud Security for Virtualization Light Agent) by adding a license key to the SVM. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

After activating the solution and connecting the Light Agent to the SVM, the Protection Server component sends license information to the Light Agent. When selecting an SVM to connect to, Light Agent considers, among other settings, the type of license key added to the SVM. The Light Agent does not connect to the SVM if the type of key added to the SVM does not match the role of the protected virtual machine in the virtual infrastructure (server or workstation). For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

You can view information about the license used by Light Agent for Linux on the protected virtual machine with the Light Agent using the -L --query command.

License keys cannot be managed using the Add key task or via the Kaspersky Endpoint Security command for adding and deleting license keys.

About updating application databases and modules in Light Agent mode

Kaspersky Endpoint Security in Light Agent mode uses malware databases, which are required for the application to work as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent. Kaspersky Endpoint Security receives application database and module updates from the Protection Server. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

Databases on protected virtual machines are updated using a special Update local task of Kaspersky Endpoint Security, where the folder on the SVM is specified as the update source. The update task starts automatically. You cannot delete this task or change its settings.

Update sources other than a folder on SVMs are not supported. The use of group update tasks is not supported.

The last application database and module update is also rolled back on the Protection Server. After rolling back the application database and module update on the SVMs, a special Update local task is automatically started on the protected virtual machine. The task causes the Light Agent to return to using the previous set of application database and modules.

The use of Rollback local and group tasks of Kaspersky Endpoint Security is not supported.

Other features of using the application in Light Agent mode

If Kaspersky Endpoint Security is used in Light Agent mode:

  • The KESL container functionality is not supported.
  • Application management using Kaspersky Security Center Cloud Console and the graphical user interface is not available.
  • iChecker technology is not used for scanning and protection. Scan optimization is implemented by means of the Protection Server.
  • The use of cloud databases is not supported.
  • Kaspersky Endpoint Security can interact with KSN servers using a KSN proxy server. Direct interaction with KSN is not supported.
  • A proxy server is not used when connecting to the Integration Server or KSN servers.

Page top

[Topic 250484]

Distribution kit

The distribution kit includes Kaspersky Endpoint Security installation package containing the following files:

  • kesl-12.0-<build number>.i386.rpm, kesl_12.0-<build number>_i386.deb

    Contain the main application files. Packages can be installed to 32-bit operating systems based on the type of package manager.

  • kesl-12.0-<build number>.x86_64.rpm, kesl_12.0-<build number>_amd64.deb

    Contain the main application files. Packages can be installed to 64-bit operating systems based on the type of package manager.

  • kesl-12.0-<build number>.aarch64.rpm, kesl_12.0-<build number>_arm64.deb

    Contain the main application files. Packages for the relevant package manager can be installed on 64-bit operating systems for the Arm architecture.

  • kesl-gui-12.0-<build number>.i386.rpm, kesl-gui_12.0-<build number>_i386.deb

    Contain the files of the application graphical user interface. Packages can be installed to 32-bit operating systems based on the type of package manager.

  • kesl-gui-12.0-<build number>.x86_64.rpm, kesl-gui_12.0-<build number>_amd64.deb

    Contain the files of the application graphical user interface. Packages can be installed to 64-bit operating systems based on the type of package manager.

  • kesl-gui-12.0-<build number>.aarch64.rpm, kesl-gui_12.0-<build number>_arm64.deb

    Contain the files of the application graphical user interface. Packages for the relevant package manager can be installed on 64-bit operating systems for the Arm architecture.

  • kesl-12.0.<build number>.zip

    Contains the files used for remote application installation using Kaspersky Security Center, including license.<language ID> and ksn_license.<language ID> files.

    Kaspersky Security Center Network Agent is not included in the distribution kit. You can download it on the application download page in the Kaspersky Security Center section.

  • docker-service-kesl64-12.0-<build number>.tgz

    Contains files for creating an image of a KESL container application.

  • ksn_license. <language ID>

    Contains the text of the Statement on Kaspersky Security Network.

  • license. <language ID>

    Contains the text of the License Agreement. The End User License Agreement specifies the terms for using the application.

Editing configuration files of the application on your on using means not described in the application documentation or not recommended by Technical Support may cause poor performance and failures of the application and operating system, reduced protection of your device, inaccessible and corrupted data, as well as the sending of additional statistics to KSN getting turned on.

Page top

[Topic 245117]

Hardware and software requirements

This section contains the hardware and software requirements for Kaspersky Endpoint Security.

In this section

Hardware requirements

Software requirements

Supported versions of Kaspersky Security Center

Supported versions of Kaspersky Anti Targeted Attack Platform

Page top

[Topic 261258]

Hardware requirements

Kaspersky Endpoint Security has the following hardware requirements:

Minimum hardware requirements:

  • Core 2 Duo 1.86 GHz or faster processor
  • swap partition at least 1 GB
  • 1 GB of RAM for 32-bit operating systems, 2 GB of RAM for 64-bit operating systems
  • 4 GB of free hard disk space for installation of the application and storage of temporary and log files
  • When using a graphical user interface, the monitor must be capable of displaying windows 1000 pixels wide and 600 pixels high (if screen scaling is applied, these dimensions are also scaled)
  • if Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, a virtual network interface with a bandwidth of 100 Mbit/s

Minimum hardware requirements for the Arm architecture:

  • Armv8.2-A Kunpeng 920 or Armv8-A Baikal-M (BE-M1000) processor or m-TrusT Terminal
  • swap partition at least 1 GB
  • 2 GB of RAM
  • 3 GB of free hard disk space for installation of the application and storage of temporary and log files
  • When using a graphical user interface, the monitor must be capable of displaying windows 1000 pixels wide and 600 pixels high (if screen scaling is applied, these dimensions are also scaled)

Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on operating systems based on the Arm architecture.

Page top

[Topic 261283]

Software requirements

To install Kaspersky Endpoint Security, one of the following operating systems must be installed on the device:

  • 32-bit operating systems:
  • 64-bit operating systems:
    • AlmaLinux OS 8 and later.
    • AlmaLinux OS 9 and later.
    • AlterOS 7.5 and later.
    • Amazon Linux 2.
    • Astra Linux Common Edition 2.12.
    • Astra Linux Special Edition RUSB.10015-01 (operational update 1.5).
    • Astra Linux Special Edition RUSB.10015-01 (operational update 1.6).
    • Astra Linux Special Edition RUSB.10015-01 (operational update 1.7).
    • Astra Linux Special Edition RUSB.10015-01 (operational update 1.8).
    • Astra Linux Special Edition RUSB.10015-16 (release 1) (operational update 1.6).
    • Astra Linux Special Edition RUSB.10015-03 (operational update 7.6).
    • Astra Linux Special Edition RUSB.10015-37 (operational update 7.7).

      Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on devices running Astra Linux operating systems in mandatory access control and closed software environment modes.

    • CentOS 6.7 and later.

      Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on devices running CentOS 6.x operating systems.

    • CentOS 7.2 and later.
    • CentOS Stream 8.
    • CentOS Stream 9.
    • Debian GNU/Linux 11.0 and later.
    • Debian GNU/Linux 12.0 and later.
    • EMIAS 1.0 and later.
    • EulerOS 2.0 SP5.
    • Kylin 10.
    • Linux Mint 20.3 and up.
    • Linux Mint 21.1 and later.
    • openSUSE Leap 15.0 and later.
    • Oracle Linux 7.3 and later.
    • Oracle Linux 8.0 and later.
    • Oracle Linux 9.0 and later.
    • Red Hat Enterprise Linux 6.7 and later.

      Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on devices running Red Hat Enterprise Linux 6.x operating systems.

    • Red Hat Enterprise Linux 7.2 and later.
    • Red Hat Enterprise Linux 8.0 and later.
    • Red Hat Enterprise Linux 9.0 and later.
    • Rocky Linux 8.5 and later.
    • Rocky Linux 9.1.
    • SberLinux 8.8 (Dykhtau).
    • SUSE Linux Enterprise Server 12.5 or later.
    • SUSE Linux Enterprise Server 15 or later.
    • Ubuntu 20.04 LTS.
    • Ubuntu 22.04 LTS.
    • ALT 8 SP Workstation.
    • ALT 8 SP Server.
    • ALT Workstation 10.
    • ALT Server 10.
    • ALT SP Workstation release 10.
    • ALT SP Server release 10.
    • Atlant, Alcyone build, version 2022.02.
    • GosLinux 7.17.
    • GosLinux 7.2.
    • MSVSPHERE 9.2 SERVER.
    • MSVSPHERE 9.2 ARM.
    • RED OS 7.3.
    • RED OS 8.0.
    • ROSA Cobalt 7.9.
    • ROSA Chrome 12.
    • SynthesisM Client 8.6.
    • SynthesisM Server 8.6.
  • 64-bit operating systems for the Arm architecture:
    • Astra Linux Special Edition RUSB.10152-02 (operational update 4.7).
    • CentOS Stream 9.
    • EulerOS 2.0 SP8.
    • SUSE Linux Enterprise Server 15.
    • Ubuntu 22.04 LTS.
    • ALT Workstation 10.
    • ALT Server 10.
    • ALT SP Workstation release 10.
    • ALT SP Server release 10.
    • RED OS 7.3.

    Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on operating systems for the Arm architecture.

Due to technical limitations of fanotify, the application does not support the following file systems: autofs, binfmt_misc, cgroup, configfs, debugfs, devpts, devtmpfs, fuse, fuse.gvfsd-fuse, gfs2, gvfs, hugetlbfs, mqueue, nfsd, proc, parsecfs, pipefs, pstore, usbfs, rpc_pipefs, securityfs, selinuxfs, sysfs, tracefs.

Page top

[Topic 261284]

Supported versions of Kaspersky Security Center

Kaspersky Endpoint Security is compatible with the following Kaspersky Security Center versions:

  • Kaspersky Security Center 13.2. The MMC administration plug-in can be used to administer Kaspersky Endpoint Security via Administration Console.
  • Kaspersky Security Center 14. Kaspersky Endpoint Security can be administered through Administration Console using the MMC administration plug-in and through Kaspersky Security Center Web Console using the web administration plug-in.
  • Kaspersky Security Center 14 Linux. The web administration plug-in can be used to administer Kaspersky Endpoint Security through Kaspersky Security Center Web Console.

    Kaspersky Security Center Linux includes a version of Administration Server intended for installation on a device running the Linux operating system. Kaspersky Security Center Linux interacts with Administration Server through Kaspersky Security Center Web Console. For more information about Kaspersky Security Center Linux, see its documentation.

    Some functionality of Kaspersky Security Center 14, e.g. features tied to Kaspersky Security Network, are unavailable in Kaspersky Security Center 14 Linux. You can manage Kaspersky Security Network usage through Kaspersky Security Center running on Windows.

  • Kaspersky Security Center 14.2. Kaspersky Endpoint Security can be administered through Administration Console using the administration MMC plug-in and through Kaspersky Security Center Web Console using the administration web plug-in.
  • Kaspersky Security Center 14.2 Linux. The web administration plug-in can be used to administer Kaspersky Endpoint Security through Kaspersky Security Center Web Console.
  • Kaspersky Security Center 15 Linux. The web administration plug-in can be used to administer Kaspersky Endpoint Security through Kaspersky Security Center Web Console.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments (as part of Kaspersky Security for Virtualization Light Agent), we recommend to manage the application using one of the following versions of Kaspersky Security Center.

  • Kaspersky Security Center 14.2.
  • Kaspersky Security Center 15 Linux.

Kaspersky Security Center Network Agent is required to manage Kaspersky Endpoint Security through Kaspersky Security Center.

Kaspersky Security Center Network Agent is not included in the Kaspersky Endpoint Security distribution kit. You can download it on the application download page in the Kaspersky Security Center section.

Page top

[Topic 268002]

Supported versions of Kaspersky Anti Targeted Attack Platform

Kaspersky Endpoint Security is compatible with the following versions of Kaspersky Anti Targeted Attack Platform:

  • Kaspersky Anti Targeted Attack Platform 5.0. Supported .
  • Kaspersky Anti Targeted Attack Platform 5.1. Supported with limitations.
  • Kaspersky Anti Targeted Attack Platform 6.0.

For more details about the Kaspersky Anti Targeted Attack Platform solution, please refer to the Kaspersky Anti Targeted Attack Platform Help.

Page top

[Topic 245686]

What's new

Kaspersky Endpoint Security now boasts the following features and improvements:

  • Kaspersky Endpoint Security can now be used in one of two modes: in Light Agent mode to protect virtual environments or in standalone mode. In Light Agent mode for protecting virtual environments, the application is used as a Light Agent component as part of the Kaspersky Security for Virtualization Light Agent solution and lets you protect virtual machines running Linux guest operating systems. In standalone mode, Kaspersky Endpoint Security is used as a standalone application to protect devices running Linux operating systems.
  • The Integration with Kaspersky Endpoint Detection and Response (KATA) task has gained new response actions aimed at ensuring security functions using commands received from Kaspersky Anti Targeted Attack Platform: Delete File task, Terminate Process task, IOC Scan task, and the ability to enable network isolation for the device.
  • The application now restarts automatically when updating using the command line and when updating using an autopatch. When updating, the application now automatically restarts to save the administrator the additional step of restarting the application.
  • The logic for saving information to dump files has been improved. The application configuration file has new settings that let you specify the directory for storing dump files and the minimum free disk space after creating dump files.
  • We added the ability to set a limit on processor utilization in the general application settings. Additionally, the ScanPriority setting was removed for ODS, Inventory Scan, Container Scan, and Custom Container Scan tasks.
  • We implemented cloud mode for Kaspersky Endpoint Security. If Kaspersky Endpoint Security is used in standalone mode (and not in Light Agent mode) and you are using KSN in the application, you can enable cloud mode. If cloud mode is enabled, Kaspersky Endpoint Security uses a lightweight version of the malware databases. This lets you reduce the load on device memory.
  • We added the ability to configure the application running in standalone mode to interact directly with KSN servers when the KSN Proxy service is unavailable.
  • The user is now better informed thanks to new events, improved event texts, an expanded list of event attributes, and an unification of events in plug-ins and the command line.
  • The procedure for initial application configuration has new steps related to selecting Light Agent mode and checking for users in privileged groups. The check for the presence of SELinux in the system has also been improved.
  • The configuration file for automatic initial application configuration has a new setting that lets you disable protection components and scan tasks when starting the application after installation. Installing the application with protection components disabled can be convenient, for example, in order to reproduce a problem in the operation of the application and create a trace file.
  • We added the ability to use unique tag combinations to specify a container or image to expand the protection scope and exclusion scope for File Threat Protection.
  • Device Control has been improved. We added the ability to export and import a list of trusted devices in Kaspersky Endpoint Security administration plug-ins. The MMC plug-in interface for this component has also been improved.
  • We added the ability to export and import exclusions by process for the Behavior Detection task in Kaspersky Endpoint Security administration plug-ins.
  • The graphical user interface implements the ability to inform the user about the operation of application components and tasks in "Notify only" mode, in which, if a threat is detected, application components and tasks do not attempt to disinfect or remove malicious objects, deny access, or block program activity, but instead only inform the user that a threat was detected. The administration plug-ins also now have a notification that "Notify only" mode has been enabled for the File Threat Protection and Device Control components.
  • We added the ability to view the remote application installation log and manage the tracing process in the Web Console properties of the managed device or in the Administration Console using the remote diagnostics utility.
  • In the Kaspersky Endpoint Security administration plug-in, in the Storages -> Backup section, we added the ability to send a file to Kaspersky for scanning.
  • We reduced the execution time for requests when running the Web Threat Protection task by caching the processes that initiate these requests.
  • The total wait time when copying files has been reduced by caching the function call for obtaining the username.
  • In new Linux kernels (beginning with version 3.4), you can now read the memory of processes without stopping them, thereby improving stability. Processes are no longer suspended when scanning memory. This reduces delays in services that ensure uninterrupted data processing, including for software that organizes the operation of clusters.
  • In the REST API for managing KESL containers, we added a request for obtaining information about the current state of a KESL container and the application status parameters that determine the state of the KESL container (the status of the application, license, and databases).
  • The list of supported operating systems has been updated.

Page top

[Topic 248502]

Preparing to install the application

General actions

Before starting installation of Kaspersky Endpoint Security, you need to perform the following actions:

  • Check that your device meets the hardware and software requirements of the application.
  • Be sure third-party anti-virus software is not installed on your device.
  • Be sure that Kaspersky Endpoint Agent for Linux is not installed on your device. If Kaspersky Endpoint Agent for Linux is installed, during the installation process you will see a message about the need to manually remote it.
  • Be sure that an interpreter for Perl version 5.10 or higher is installed on your device.
  • On devices with operating systems that do not support fanotify technology, make sure that the following are installed:
    • Packages for compiling applications and running tasks (gcc, binutils, glibc, glibc-devel, make);
    • Package with header files of the operating system kernel for compiling Kaspersky Endpoint Security modules.
  • Install one of the following packages on your device depending on the operating system:
    • On devices running the SUSE Linux Enterprise Server 15 operating system, the insserv-compat package must be installed.
    • On devices running the Red Hat Enterprise Linux 8 or RED OS operating system, install the perl-Getopt-Long package.
    • On devices running the Red Hat Enterprise Linux or RED OS operating systems, install the perl-File-Copy package. This package is required for the initial application configuration script to work, but may be absent by default.
  • By default, Astra Linux operating systems block ptrace (Disable ptrace capability), which may affect the operation of Kaspersky Endpoint Security. For Kaspersky Endpoint Security to work correctly, unblock ptrace when installing Astra Linux. If Astra Linux is already installed, see the Astra Linux Help Center website for instructions on how to enable/disable this mode (Configuring protection and blocking mechanisms in the Blocking ptrace section).
  • If your device uses a Linux kernel lower than 3.16, then in order for the Kaspersky Endpoint Detection and Response (KATA) Integration task to work correctly, you need to make sure the auditd service is not started and not installed.
  • For the Firewall Management, Web Threat Protection and Network Threat Protection tasks to work, the iptables utility needs to be installed on your device.
  • For the Kaspersky Endpoint Security administration plug-in to work, Microsoft Visual C++ 2015 Redistributable Update 3 RC (see https://www.microsoft.com/en-us/download/details.aspx?id=52685) must be installed on the Administration Server.
  • To run the application, make sure that the root account is the owner of the following directories and that only the owner has the right to write to them: /var, /var/opt, /var/opt/kaspersky, /var/log/kaspersky, /opt, /opt/kaspersky, /usr/bin, /usr/lib, /usr/lib64.

Additional actions before installing Kaspersky Endpoint Security in Light Agent mode

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent), you must perform the following additional actions before starting the installation of Kaspersky Endpoint Security:

  • Make sure that the following packages are installed on the virtual machines that you want to protect, depending on the virtual infrastructure in which Kaspersky Hybrid Cloud Security for Virtualization Light Agent is deployed:
    • In a Microsoft Hyper-V infrastructure, the Integration Services package must be installed on the virtual machines.
    • In a VMware vSphere infrastructure, the VMware Tools package must be installed on the virtual machines.
    • In a Citrix Hypervisor infrastructure, XenTools must be installed on the virtual machines.
    • In a HUAWEI FusionSphere infrastructure, the HUAWEI Tools package must be installed on the virtual machines.
    • In an infrastructure based on KVM, TIONIX Cloud Platform, OpenStack, Astra Linux, or Viola Virtualization Server, QEMU Guest Agent must be installed on virtual machines.
  • Make sure that the settings of network equipment or software that monitor traffic between virtual machines allow network traffic to pass through the ports that are used for interaction between Kaspersky Endpoint Security in Light Agent mode and other components of Kaspersky Hybrid Cloud Security for Virtualization Light Agent. For more details about the solution components, please refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

    Ports used for operation of the Light Agent

    Port and protocol

    Direction

    Purpose and description

    7271 TCP

    From the Light Agent to the Integration Server.

    For interaction between the Light Agent and the Integration Server.

    8000 UDP

    From the SVM to the Light Agent.

    For transmitting information about available SVMs to Light Agents using a list of SVM addresses.

    8000 UDP

    From the Light Agent to SVMs.

    For the Light Agent to receive information about the status of the SVM.

    11111 TCP

    From the Light Agent to SVMs.

    For transmitting service requests (for example, to obtain license information) from the Light Agent to the Protection Server when the connection is unprotected.

    11112 TCP

    From the Light Agent to SVMs.

    For transmitting service requests (for example, to obtain license information) from the Light Agent to the Protection Server when the connection is protected.

    9876 TCP

    From the Light Agent to SVMs.

    For forwarding file scan requests from the Light Agent to the Protection Server when the connection is unprotected.

    9877 TCP

    From the Light Agent to SVMs.

    For transmitting file scan requests from the Light Agent to the Protection Server when the connection is protected.

    80 TCP

    From the Light Agent to SVMs.

    For updating databases and application modules of the solution on the Light Agent.

    15000 UDP

    From Kaspersky Security Center to SVMs.

    For managing the Protection Server via Kaspersky Security Center.

    15000 UDP

    From Kaspersky Security Center to Light Agents.

    For managing the Light Agent via Kaspersky Security Center.

    13000 TCP

    From the Light Agent to Kaspersky Security Center.

    For managing the Light Agent via Kaspersky Security Center when the connection is protected.

    14000 TCP

    From the Light Agent to Kaspersky Security Center.

    For managing Light Agent via Kaspersky Security Center when the connection is unprotected.

Page top

[Topic 248501]

Installing the application

You need to prepare for installation before installing Kaspersky Endpoint Security.

The scenarios below describe how to install and perform initial configuration of Kaspersky Endpoint Security, how to install and configure Kaspersky Security Center Network Agent and how to install Kaspersky Endpoint Security administration plug-ins. The installation scenario depends on the mode in which you plan to use Kaspersky Endpoint Security.

Standalone mode

If you plan to use Kaspersky Endpoint Security in standalone mode, installation and initial configuration of Kaspersky Endpoint Security consists of the following steps:

  1. Installation and initial configuration of the Network Agent

    If you plan to manage Kaspersky Endpoint Security using Kaspersky Security Center, install and configure Kaspersky Security Center Network Agent on the protected device.

  2. Installing the Kaspersky Endpoint Security administration plug-in

    If you plan to manage Kaspersky Endpoint Security using Kaspersky Security Center, install the Kaspersky Endpoint Security administration plug-in. Depending on the console used to manage Kaspersky Security Center, the following administration plug-ins are used:

    • The Kaspersky Endpoint Security administration MMC plug-in lets you manage the application using Kaspersky Security Center Administration Console. The MMC plug-in is installed on the device where Kaspersky Security Center Administration Console is installed.
    • The Kaspersky Endpoint Security management web plug-in lets you manage the application using Kaspersky Security Center Cloud Console and Kaspersky Security Center Web Console. The web plug-in is installed on the device that has Kaspersky Security Center Web Console installed.
  3. Installing application packages and graphical user interface

    Kaspersky Endpoint Security and the graphical user interface are distributed in DEB and RPM format packages. Install Kaspersky Endpoint Security and, if necessary, the graphical user interface from packages in the appropriate format.

    You can install the application using the command line or using Kaspersky Security Center by means of the Administration Console or Kaspersky Security Center Web Console.

  4. Initial configuration of Kaspersky Endpoint Security

    The initial configuration must be performed to enable the protection of the client device.

    If you installed Kaspersky Endpoint Security using the command line, run the initial configuration script or perform the initial configuration in automatic mode.

    If you installed Kaspersky Endpoint Security using Kaspersky Security Center, go through the Getting started procedure.

Light Agent mode

Using Kaspersky Endpoint Security in Light Agent mode to protect virtual environments is not supported on operating systems based on the Arm architecture.

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments, installation and initial configuration of Kaspersky Endpoint Security consists of the following steps:

  1. Installation and initial configuration of the Network Agent

    Install and configure Kaspersky Security Center Agent on virtual machines and virtual machine templates.

    If you are installing Network Agent on a template that will be used to create temporary virtual machines, it is recommended to configure settings that allow you to optimize performance on temporary virtual machines. For more details about installing on a virtual machine template, refer to the Help for Kaspersky Security for Virtualization Light Agent.

  2. Installing the Kaspersky Endpoint Security administration plug-in

    Install a Kaspersky Endpoint Security administration plug-in. Depending on the console used to manage Kaspersky Security Center, the following administration plug-ins are used:

    • The Kaspersky Endpoint Security administration MMC plug-in lets you manage the application using Kaspersky Security Center Administration Console. The MMC plug-in is installed on the device where Kaspersky Security Center Administration Console is installed.
    • The Kaspersky Endpoint Security management web plug-in lets you manage the application using Kaspersky Security Center Cloud Console and Kaspersky Security Center Web Console. The web plug-in is installed on the device that has Kaspersky Security Center Web Console installed.
  3. Installing application packages

    Kaspersky Endpoint Security is distributed in packages in the DEB and RPM formats. Install Kaspersky Endpoint Security from a package of the required format.

    The graphical user interface is not supported if Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments.

    You can install the application using the command line or using Kaspersky Security Center by means of the Administration Console or Kaspersky Security Center Web Console.

    If installing via Kaspersky Security Center, you need to select Light Agent mode in the autoinstall.ini file (KSVLA_MODE=yes) and include this file in the installation package used when installing the application. If you install Kaspersky Endpoint Security on a template that will be used to create temporary virtual machines, it is recommended to also configure the VDI_MODE=yes setting in the autoinstall.ini file, which allows you to optimize the operation on temporary virtual machines.

  4. Initial configuration of Kaspersky Endpoint Security

    The initial configuration must be performed to enable the protection of the client device.

    • If you installed Kaspersky Endpoint Security using the command line, run the initial configuration script or perform the initial configuration in automatic mode. You need to select Light Agent mode in one of the following ways:
      • Enter yes in the Specifying the application usage step of the initial configuration script.
      • Specify the KSVLA_MODE=yes setting in the initial setup configuration file.

      If you install Kaspersky Endpoint Security on a template that will be used to create temporary virtual machines, it is recommended to also configure the setting, which allows you to optimize the operation on temporary virtual machines. For more details about installing on a virtual machine template, refer to the Help for Kaspersky Security for Virtualization Light Agent.

    • If you installed Kaspersky Endpoint Security using Kaspersky Security Center, go through the Getting started procedure.

In this Help section

Deploying the application using the command line

Installing and configuring Kaspersky Security Center Network Agent

Installing Kaspersky Endpoint Security administration plug-ins

Deploying the application using Kaspersky Security Center

Running the application on Astra Linux in closed software environment mode

Configuring allowing rules in the SELinux system

Page top

[Topic 198107]

Deploying the application using the command line

Kaspersky Endpoint Security is distributed in the DEB and RPM packages. There are separate packages for the application and for the graphical user interface.

You can perform the following actions when installing the application:

  • Install only the application package, without the graphical user interface.
  • Install the graphical user interface package.

    It is not possible to install the graphical user interface package on a client device that does not have the application package installed.

    If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent), the graphical user interface is not supported. You need to install only the application package without the graphical user interface.

If the version of the apt package manager is lower than 1.1.X, use the dpkg/rpm package manager (depending on the operating system) for installation.

After the application installation using the command line is completed, perform the post-installation configuration of the application by running the post-installation configuration script or in the automatic mode.

In this section

Installing the application using the command line

Post-installation configuration of the application in interactive mode

Post-installation configuration of the application in automatic mode

Settings in the configuration file for post-installation configuration

Page top

[Topic 233694]

Installing the application using the command line

Installing the application without the graphical interface.

To install Kaspersky Endpoint Security from an RPM package on a 32-bit operating system, execute the following command:

# rpm -i kesl-12.0-<build number>.i386.rpm

To install Kaspersky Endpoint Security from an RPM package on a 64-bit operating system, execute the following command:

# rpm -i kesl-12.0-<build number>.x86_64.rpm

To install Kaspersky Endpoint Security from an RPM package on a 64-bit operating system for the Arm architecture, execute the following command:

# rpm -i kesl-12.0-<build number>.aarch64.rpm

To install Kaspersky Endpoint Security from a DEB package on a 32-bit operating system, execute the following command:

# apt-get install ./kesl_12.0-<build number>_i386.deb

To install Kaspersky Endpoint Security from a DEB package on a 64-bit operating system, execute the following command:

# apt-get install ./kesl_12.0-<build number>_amd64.deb

To install Kaspersky Endpoint Security from a DEB package on a 64-bit operating system for the Arm architecture, execute the following command:

# apt-get install ./kesl_12.0-<build number>_arm64.deb

Installing the graphical interface of the application

To install the graphical interface from the RPM package to a 32-bit operating system, execute the following command:

# rpm -i kesl-gui-12.0-<build number>.i386.rpm

To install the graphical interface from the RPM package to a 64-bit operating system, execute the following command:

# rpm -i kesl-gui-12.0-<build number>.x86_64.rpm

To install the graphical interface from an RPM package on a 64-bit operating system for the Arm architecture, execute the following command:

# rpm -i kesl-gui-12.0-<build number>.aarch64.rpm

To install the graphical interface from the DEB package to a 32-bit operating system, execute the following command:

# apt-get install ./kesl-gui_12.0-<build number>_i386.deb

To install the graphical interface from the DEB package to a 64-bit operating system, execute the following command:

# apt-get install ./kesl-gui_12.0-<build number>_amd64.deb

To install the graphical interface from a DEB package on a 64-bit operating system for the Arm architecture, execute the following command:

# apt-get install ./kesl-gui_12.0-<build number>_arm64.deb

Page top

[Topic 197897]

Post-installation configuration of the application in interactive mode

After installing Kaspersky Endpoint Security using the command line, perform the initial configuration of the application by running the initial configuration script. The initial configuration script is included in the Kaspersky Endpoint Security distribution kit.

Performing the post-installation configuration after installing the application using the command line is required to enable the protection of the client device.

To run the Kaspersky Endpoint Security initial configuration script, execute the following command:

# /opt/kaspersky/kesl/bin/kesl-setup.pl

The initial configuration script must be run with the root privileges after the installation of Kaspersky Endpoint Security package is finished. The script requests the values of Kaspersky Endpoint Security settings step-by-step. The script finishing and the console being released indicate that the post-installation configuration is completed.

To check the return code, execute the following command:

echo $?

If the command returns 0, the post-installation configuration of the application is completed successfully.

Kaspersky Endpoint Security protects the device only after the application databases are updated.

In this section

Selecting the application usage mode

Defining the role of the virtual machine

Enabling VDI protection mode

Selecting the locale

Viewing the End User License Agreement and the Privacy Policy

Accepting the End User License Agreement

Accepting the Privacy Policy

Using Kaspersky Security Network

Removing users from privileged groups

Assigning the Administrator role to a user

Determining the file operation interceptor type

Enabling automatic configuration of SELinux

Configuring the update source

Configuring proxy server settings

Starting an application database update

Enabling automatic application database update

Application activation

Page top

[Topic 82654]

Selecting the application usage mode

At this step, select the Kaspersky Endpoint Security usage mode:

  • Enter yes if you want to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments.
  • Enter no if you want to use Kaspersky Endpoint Security in standalone mode.

After the initial configuration is complete, you cannot change the application usage mode.

Page top

[Topic 90255]

Defining the role of the virtual machine

This step is displayed only if at the first step you selected to use Kaspersky Endpoint Security in Light Agent mode for protecting virtual environments.

At this step, specify the role of the virtual machine (server or workstation) on which you are installing Kaspersky Endpoint Security:

  • Enter yes if you are using the virtual machine as a server.
  • Enter no if you are using a virtual machine as a workstation.

The role of a virtual machine determines the license under which the application will be used on this virtual machine as well as the available functionality.

Page top

[Topic 85820]

Enabling VDI protection mode

This step is displayed only if at the first step you selected to use Kaspersky Endpoint Security in Light Agent mode for protecting virtual environments.

At this step, you can enable VDI protection mode. This mode optimizes the operation of Kaspersky Endpoint Security on temporary virtual machines. If VDI protection mode is enabled, updates that require restarting the virtual machine are not installed. When receiving updates that require a restart, the Light Agent installed on the virtual machine sends a message to Kaspersky Security Center about the need to update the protected virtual machine template.

Specify yes if you want to enable VDI protection mode. This is recommended if you are installing Kaspersky Endpoint Security on a virtual machine template that will be used to create temporary virtual machines.

Specify no if you do not want to enable VDI protection mode. This is recommended if you are installing Kaspersky Endpoint Security on a persistent virtual machine or on a virtual machine template that will be used to create persistent virtual machines.

Page top

[Topic 197898]

Selecting the locale

At this step, the application displays the list of supported locale identifiers in RFC 3066 format.

Specify the locale in the format as identified in this list. This locale will be used for application events sent to Kaspersky Security Center, as well as for the texts of the License Agreement, Privacy Policy, and Kaspersky Security Network Statement.

The locale of the graphical interface and the application command line depends on the value of the LANG environment variable. If the locale that is not supported by Kaspersky Endpoint Security is specified as the value of the LANG environment variable, the graphical interface and the command line are displayed in English.

Page top

[Topic 199016]

Viewing the End User License Agreement and the Privacy Policy

At this step, read the End User License Agreement concluded between you and Kaspersky, and the Privacy Policy describing the handling and transmission of data.

Page top

[Topic 197899]

Accepting the End User License Agreement

At this step, you must either accept or decline the terms of the End User License Agreement.

After exiting viewing mode, enter one of the following values:

  • yes (or y), if you accept the terms of the End User License Agreement.
  • no (or n), if you do not accept the terms of the End User License Agreement.

If you did not accept the terms and conditions of the End User License Agreement, the Kaspersky Endpoint Security setup process is aborted.

Page top

[Topic 197900]

Accepting the Privacy Policy

At this step, you must either accept or decline the terms of the Privacy Policy.

After exiting viewing mode, enter one of the following values:

  • yes (or y), if you accept the terms of the Privacy Policy.
  • no (or n), if you do not accept the terms of the Privacy Policy.

If you did not accept the terms and conditions of the Privacy Policy, the Kaspersky Endpoint Security setup process is aborted.

Page top

[Topic 197901]

Using Kaspersky Security Network

At this step, you must either accept or decline the terms of use of the Kaspersky Security Network Statement. The file ksn_license.<language ID> containing the text of the Kaspersky Security Network Statement is located in the directory /opt/kaspersky/kesl/doc/.

Enter one of the following values:

  • yes (or y), if you accept the terms of the Kaspersky Security Network Statement. This enables the extended KSN mode.
  • no (or n), if you do not accept the terms of the Kaspersky Security Network Statement.

Refusal to participate in Kaspersky Security Network does not interrupt the initial configuration of Kaspersky Endpoint Security. You can enable, disable, or change the Kaspersky Security Network mode at any time.

If Kaspersky Endpoint Security is used in standalone mode and you have enabled the use of Kaspersky Security Network, the application's cloud mode is automatically enabled. In this mode, Kaspersky Endpoint Security uses a lightweight version of the malware databases. In Light Agent mode for protecting virtual environments, use of the lightweight malware databases is not supported.

Page top

[Topic 93536]

Removing users from privileged groups

This step is displayed only if users are detected in the kesladmin group and/or in the keslaudit group.

At this step, specify whether or not to remove users from the kesladmin and keslaudit privileged groups. Users included in the kesladmin and keslaudit groups receive privileged access to the application's functions.

Enter yes to remove all detected users from the kesladmin and/or keslaudit group. Users whose primary group is kesladmin or keslaudit will be moved to the nogroup group. If there is no nogroup group, the installation will fail and you will be prompted to manually remove users from privileged groups.

Enter no if you do not want the application to remove users from the privileged groups.

Page top

[Topic 206406]

Assigning the Administrator role to a user

At this step, you can grant the administrator (admin) role to the user.

Enter the name of the user to whom you want to grant the administrator role.

You can grant the administrator role to the user later at any time.

Page top

[Topic 197903]

Determining the file operation interceptor type

At this step, the file operation interceptor type for the utilized operating system is determined. For operating systems that do not support fanotify technology, kernel module compilation will begin.

If all the required packages are available, the kernel module will be automatically compiled when the File Threat Protection task starts.

If, during the compilation of the kernel module, any dependencies are not found on the device, the Kaspersky Endpoint Security application suggests installing the relevant packages. If the package download fails, an error message will be displayed.

Page top

[Topic 237159]

Enabling automatic configuration of SELinux

This step is displayed only if SELinux is installed on your operating system.

At this step, you can enable automatic configuration of SELinux for working with Kaspersky Endpoint Security.

Enter yes to enable automatic configuration of SELinux. If SELinux cannot be configured automatically, the application displays an error message and prompts the user to configure SELinux manually.

Enter no if you do not want the application to automatically configure SELinux.

By default, the application suggests yes.

If necessary, you can manually configure SELinux to work with the application later, after the initial configuration of Kaspersky Endpoint Security is complete.

Page top

[Topic 197904]

Configuring the update source

This step is displayed only if you selected to use Kaspersky Endpoint Security in standalone mode at the first step. If Kaspersky Endpoint Security is used in Light Agent mode, Kaspersky Endpoint Security receives updates of databases and application modules for the Light Agent from the Protection Server.

At this step, specify the update sources for databases and application modules.

Enter one of the following values:

  • KLServers: the application receives updates from one of the Kaspersky update servers.
  • SCServer: the application downloads updates to the protected device from Kaspersky Security Center Administration Server installed in your organization. You can select this update source if you use Kaspersky Security Center for centralized administration of device protection in your organization.
  • <URL>: the application downloads updates from a custom source. You can specify the address of the custom source of updates in the local area network or on the Internet.
  • <path> – the application receives updates from the specified directory.

Page top

[Topic 197905]

Configuring proxy server settings

This step is displayed only if you selected to use Kaspersky Endpoint Security in standalone mode at the first step.

At this step, you must specify the proxy server settings if you are using a proxy server to access the Internet. Internet connection is required to download the application databases from the update servers.

To configure proxy server settings, perform one of the following actions:

  • If you use a proxy server to connect to the Internet, specify the address of the proxy server using one of the following formats:
    • <IP address of the proxy server>:<port number>, if the proxy server connection does not require authentication;
    • <user name>:<password>@<IP address of the proxy server>:<port number>, if the proxy server connection requires authentication.

      When connecting via an HTTP proxy, we recommend to use a separate account that is not used to sign in to other systems. An HTTP proxy uses an insecure connection, and the account may be compromised.

  • If you do not use a proxy server to connect to the Internet, enter no as your answer.

By default, the application suggests no.

You can configure the proxy server settings later without using the post-installation configuration script.

Page top

[Topic 197906]

Starting an application database update

This step is displayed only if you selected to use Kaspersky Endpoint Security in standalone mode at the first step. If Kaspersky Endpoint Security is used in Light Agent mode, Kaspersky Endpoint Security receives updates of databases and application modules for the Light Agent from the Protection Server.

At this step, you can run the application database update task on the client device. The application databases contain descriptions of the threat signatures and methods of countering them. The application uses these records when searching and neutralizing threats. Kaspersky virus analysts regularly add new records about threats.

If you do not want to start to download the application databases, enter no.

If you want to start the database update task on the device, enter yes.

By default, the application suggests yes.

If yes is selected, the application will be automatically restarted after the databases are updated.

Kaspersky Endpoint Security protects the device only after the application databases are updated.

You can start the Update task without using the initial configuration script.

Page top

[Topic 197907]

Enabling automatic application database update

This step is displayed only if you selected to use Kaspersky Endpoint Security in standalone mode at the first step. If Kaspersky Endpoint Security is used in Light Agent mode, Kaspersky Endpoint Security receives updates of databases and application modules for the Light Agent from the Protection Server.

At this step, you can enable automatic update of the application databases.

Enter yes to enable automatic application database update. By default, the application checks for available database updates every 60 minutes. If updates are available, the application downloads the updated databases.

Enter no if you do not want the application to automatically update the databases.

You can enable automatic database update without using the initial configuration script by configuring the update task schedule.

Page top

[Topic 197908]

Application activation

This step is displayed only if you selected to use Kaspersky Endpoint Security in standalone mode at the first step. If Kaspersky Endpoint Security is used in Light Agent mode, Kaspersky Endpoint Security receives information about the license from the Protection Server; there is no need to activate Kaspersky Endpoint Security separately.

At this step, activate the application using an activation code or a key file.

To activate the application using an activation code, enter the activation code.

To activate the application using a key file, specify the full path to the key file.

If no activation code or key file is specified, the application is activated using a trial key for one month.

You can activate the application later without using the post-installation configuration script.

Page top

[Topic 197909]

Post-installation configuration of the application in automatic mode

You can perform post-installation configuration of the application in automatic mode.

To launch the automatic initial setup of the application, carry out the following command:

# /opt/kaspersky/kesl/bin/kesl-setup.pl --autoinstall=<initial configuration file>

where <post-installation configuration file> is a path to the configuration file that contains post-installation configuration settings. You can create this file or copy the necessary structure from the autoinstall.ini configuration file used for remote installation of the application using Kaspersky Security Center.

When the post-installation configuration script is finished and releases the console, the post-installation configuration of the application is complete.

To check the return code, execute the following command:

echo $?

If the command returns 0, the post-installation configuration of the application is completed successfully.

Kaspersky Endpoint Security protects the device only after the application databases are updated.

To correctly update application modules after the script has finished, you may need to restart the application. Check the status of updates for the application using the kesl-control --app-info command.

Page top

[Topic 236947]

Settings in the configuration file for post-installation configuration

In the post-installation configuration file, you can specify the settings shown in the table below. The set of applicable settings depends on the application usage mode.

Settings in the configuration file for post-installation configuration

Setting

Description

Values

KSVLA_MODE

Kaspersky Endpoint Security usage mode.

yes - Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent).

no - Kaspersky Endpoint Security is used in standalone mode.

SERVER_MODE

The role of the protected virtual machine (server or workstation).

The setting is applied only if the application is used in Light Agent mode.

yes - the protected virtual machine is used as a server.

no - the protected virtual machine is used as a workstation.

VDI_MODE

Enabling VDI protection mode to optimize application performance on temporary virtual machines.

The setting is applied only if the application is used in Light Agent mode.

yes – enable VDI protection mode. This is recommended if you are installing Kaspersky Endpoint Security on a virtual machine template that will be used to create temporary virtual machines.

no – do not enable VDI protection mode.

EULA_AGREED

Required setting.

Acceptance of the terms of the End User License Agreement.

yes: accept the terms of the End User License Agreement to continue the application installation.

no – do not accept the End User License Agreement. The application installation will be terminated.

PRIVACY_POLICY_AGREED

Required setting.

Acceptance of the terms of the Privacy Policy.

yes: accept the Privacy Policy to continue installing the application.

no – do not accept the terms and conditions of the Privacy Policy. The application installation will be terminated.

USE_KSN

Required setting.

Enabling Kaspersky Security Network usage: To enable the use of KSN, the terms of the Kaspersky Security Network Statement must be accepted.

yes – accept the terms of the Kaspersky Security Network Statement and enable the use of KSN.

no – do not accept the Kaspersky Security Network Statement.

If Kaspersky Endpoint Security is used in standalone mode and you have enabled the use of KSN, the application's cloud mode is automatically enabled. In this mode, Kaspersky Endpoint Security uses a lightweight version of the malware databases.

GROUP_CLEAN

Required setting.

Removing users from the kesladmin and keslaudit privileged groups.

yes - Remove users from the privileged groups. If the value is yes and there is no nogroup group, the installation will fail and you will be prompted to manually remove users from privileged groups.

no - Do not remove users from the privileged groups.

LOCALE

Optional setting.

The locale used for the application events sent to Kaspersky Security Center.

The locale in the format specified by RFC 3066.

If the Locale setting is not specified, the operating system locale is used. If the application fails to determine the operating system localization language or the operating system localization is not supported, the default value will be used – en_US.utf8.

The locale of the graphical interface and the application command line depends on the value of the LANG environment variable. If the locale that is not supported by Kaspersky Endpoint Security is specified as the value of the LANG environment variable, the graphical interface and the command line are displayed in English.

INSTALL_LICENSE

Activation code or key file.

This setting applies only if the application is used in standalone mode.

 

UPDATER_SOURCE

Update source.

This setting applies only if the application is used in standalone mode.

SCServer – use the Kaspersky Security Center Administration Server as the update source.

KLServers – use Kaspersky servers as the update source.

Update source address

PROXY_SERVER

Address of the proxy server used to connect to the Internet.

This setting applies only if the application is used in standalone mode.

Proxy server address

UPDATE_EXECUTE

Start application database update task during setup.

This setting applies only if the application is used in standalone mode.

yes – start update task.

no – do not start update task.

KERNEL_SRCS_INSTALL

Automatic start of kernel module compilation.

yes – compile kernel module.

no – do not compile kernel module.

ADMIN_USER

A user assigned the administrator role (admin).

 

CONFIGURE_SELINUX

Automatic configuration of SELinux for working with Kaspersky Endpoint Security.

yes – automatically configure SELinux to work with Kaspersky Endpoint Security.

no – do not automatically configure SELinux to work with Kaspersky Endpoint Security.

DISABLE_PROTECTION

Disable protection components and scan tasks after the application is installed.

An installation with protection components disabled can be convenient, for example, in order to reproduce a problem in the operation of the application and create a trace file.

If you enable the necessary components and tasks after installing the application with the DISABLE_PROTECTION=yes parameter, the enabled components and tasks will continue to work after the application is restarted.

yes - Disable protection components and scan tasks when the application is started after installation.

no - Do not disable protection components and scan tasks when the application is started after installation.

If you want to change the settings in the configuration file for initial setup of the application, specify the values of settings in the following format: <setting_name>=<setting_value> (the application does not process spaces between the name of a setting and its value).

Page top

[Topic 198105]

Installing and configuring Kaspersky Security Center Network Agent

Network Agent must be installed in order to manage Kaspersky Endpoint Security via Kaspersky Security Center.

Network Agent facilitates the client device's connection with the Kaspersky Security Center Administration Server. It must be installed on every client device that will be connected to Kaspersky Security Center, the centralized remote management system.

You can perform installation and post-installation configuration of Network Agent using the command line. Network Agent can also be installed and configured remotely using Kaspersky Security Center (for details, refer to Kaspersky Security Center documentation).

In this section

Installing Network Agent using the command line

Post-installation configuration of the Network Agent using the command line

Page top

[Topic 237152]

Installing Network Agent using the command line

The Network Agent installation process must be started with root privileges.

To install Network Agent from an RPM package to a 32-bit operating system, execute the following command:

# rpm -i klnagent-<build number>.i386.rpm

To install Network Agent from an RPM package to a 64-bit operating system, execute the following command:

# rpm -i klnagent64-<build number>.x86_64.rpm

To install Network Agent from an RPM package on a 64-bit operating system for the Arm architecture, execute the following command:

# rpm -i klnagent64-<build number>.aarch64.rpm

To install Network Agent from a DEB package to a 32-bit operating system, execute the following command:

# apt-get install ./klnagent_<build number>_i386.deb

To install Network Agent from a DEB package to a 64-bit operating system, execute the following command:

# apt-get install ./klnagent64_<build number>_amd64.deb

To install Network Agent from a DEB package on a 64-bit operating system for the Arm architecture, execute the following command:

# apt-get install ./klnagent64_<build number>_arm64.deb

After installing the package, perform initial configuration of the Network Agent.

Page top

[Topic 197913]

Post-installation configuration of the Network Agent using the command line

To configure Network Agent settings:

  1. Execute the command:
    • for a 32-bit operating system:

      # /opt/kaspersky/klnagent/lib/bin/setup/postinstall.pl

    • for a 64-bit operating system:

      # /opt/kaspersky/klnagent64/lib/bin/setup/postinstall.pl

  2. Accept the End User License Agreement.
  3. Specify the DNS name or IP address of the Administration Server.
  4. Specify the port number of the Administration Server.

    Port 14000 is used by default.

  5. If you want to use an SSL connection, specify the SSL port number of the Administration Server.

    Port 13000 is used by default.

  6. Do one of the following:
    • Enter yes if you want to use an SSL connection.
    • Enter no if you do not want to use an SSL connection.

    By default, SSL connection is enabled.

  7. If necessary, specify the connection gateway usage mode:
    • 1—Do not configure a connection gateway.
    • 2—Do not use a connection gateway.
    • 3—Connect to the Administration Server using a connection gateway.
    • 4—Use the Network Agent as a connection gateway.

    The default value is the first option.

For more detailed information about configuring Network Agent, please refer to the Kaspersky Security Center documentation.

Page top

[Topic 233554]

Installing Kaspersky Endpoint Security administration plug-ins

The following Kaspersky Endpoint Security administration plug-ins are used to manage Kaspersky Endpoint Security using Kaspersky Security Center:

  • The Kaspersky Endpoint Security MMC administration plug-in lets you manage the application using Kaspersky Security Center Administration Console.
  • The Kaspersky Endpoint Security management web plug-in lets you manage the application using Kaspersky Security Center Cloud Console and Kaspersky Security Center Web Console.

You can install administration plug-ins for different versions of Kaspersky Endpoint Security simultaneously. This allows you to manage the application by using the policies created with different administration plug-in versions. You can also convert policies and tasks created with previous versions of the administration plug-in to newer versions.

In this section

About the Kaspersky Endpoint Security administration MMC plug-in

About the Kaspersky Endpoint Security administration web plug-in

Page top

[Topic 198108]

About the Kaspersky Endpoint Security administration MMC plug-in

The Kaspersky Endpoint Security administration MMC plug-in (hereinafter also referred to as the MMC plug-in) facilitates interaction between Kaspersky Endpoint Security and Kaspersky Security Center using the Administration Console. The MMC plug-in allows you to manage Kaspersky Endpoint Security using policies and tasks.

The MMC plug-in must be installed on the same client device where Kaspersky Security Center Administration Console is installed.

Before installing Kaspersky Endpoint Security administration MMC plug-in, make sure that Kaspersky Security Center and Redist C++ 2015 (Microsoft Visual C++ 2015 Redistributable) are installed.

For more details about administration plug-ins, refer to Kaspersky Security Center documentation.

Page top

[Topic 202111]

About Kaspersky Endpoint Security administration web plug-in

Kaspersky Endpoint Security management web plug-in (hereinafter also referred to as web plug-in) facilitates interaction between Kaspersky Endpoint Security and Kaspersky Security Center using Kaspersky Security Center Web Console and Kaspersky Security Center Cloud Console. The web plug-in allows you to manage Kaspersky Endpoint Security using policies and tasks.

The web plug-in must be installed on the client device that has Kaspersky Security Center Web Console installed. The functionality of the web plug-in is available to all administrators who have access to Kaspersky Security Center Web Console in a browser.

You can view the list of installed web plug-ins in Kaspersky Security Center Web Console interface: Console settingsWeb plug-ins. For more information about compatibility of the web plug-in and Kaspersky Security Center Web Console versions, refer to Kaspersky Security Center documentation.

If you select a language that is not included in Kaspersky Endpoint Security distribution package in the properties of Kaspersky Security Center Administration Server, the License Agreement and the entire Kaspersky Security Center Web Console interface will be displayed in English.

Installing the web plug-in

You can install the web plug-in as follows:

  • Using the Quick Start Wizard for Kaspersky Security Center Web Console.

    Kaspersky Security Center Web Console automatically prompts you to run the Initial Setup Wizard when connecting Web Console to the Administration Server for the first time. You can also run the Initial Setup Wizard in the Web Console interface (Device discovery and deploymentDeployment and assignmentInitial Setup Wizard). The Initial Configuration Wizard can also check if the installed web plug-ins are up to date and download the necessary updates. For more information on the Initial Setup Wizard for Kaspersky Security Center Web Console, please refer to Kaspersky Security Center documentation.

  • From the list of available distribution kits in Kaspersky Security Center Web Console.

    To install the web plug-in, select the web plug-in distribution kit in the Web Console interface: Console settingsWeb plug-ins. The list of available distribution packages is updated automatically after new versions of Kaspersky applications are released.

  • Download the distribution kit to Kaspersky Security Center Web Console from an external source.

    To install the web plug-in, add the ZIP-archive of the web plug-in distribution kit in the Web Console interface: Console settingsWeb plug-ins. The distribution kit of the web plug-in can be downloaded on the Kaspersky website, for example. For a local version of the application, additionally upload a text file that contains a signature.

Updating the web plug-in

If a new version of the web plug-in becomes available, Kaspersky Security Center Web Console displays the Updates are available for utilized plug-ins notification. You can proceed to update the web plug-in version from this Web Console notification. You can also manually check for new web plug-in updates in the Web Console interface (Console settingsWeb plug-ins). The previous version of the web plug-in will be automatically removed during the update.

When the web plug-in is updated, already existing components (for example, policies or tasks) are saved. The new settings of components implementing new functions of Kaspersky Endpoint Security will appear in existing components and will have the default values.

You can update the web plug-in as follows:

  • In the list of web plug-ins in online mode.

    To update the web plug-in, select the distribution package of Kaspersky Endpoint Security web plug-in in the Kaspersky Security Center Web Console interface (Console settingsWeb plug-ins) and run the update. Web Console checks for available updates on Kaspersky servers and downloads the relevant updates.

  • From a file.

    To update the web plug-in, select the ZIP-archive of the distribution package of Kaspersky Endpoint Security web plug-in in the Kaspersky Security Center Web Console interface: Console settingsWeb plug-ins. The distribution kit of the web plug-in can be downloaded on the Kaspersky website, for example. For a local version of the application, additionally upload a text file that contains a signature.

    You can only update the web plug-in to a more recent version. The web plug-in cannot be updated to an older version.

If any component is opened (such as a policy or task), the web plug-in checks its compatibility information. If the version of the web plug-in is equal to or later than the version specified in the compatibility information, you can change the settings of this component. Otherwise, you cannot use the web plug-in to change the settings of the selected component. It is recommended to update the web plug-in.

Page top

[Topic 197922]

Deploying the application using Kaspersky Security Center

You can install Kaspersky Endpoint Security on a client device remotely from the administrator's workstation using Kaspersky Security Center Administration Console or Kaspersky Security Center Web Console.

For the remote installation, Kaspersky Endpoint Security installation package is used. An installation package is a set of files created for remote installation of Kaspersky applications using Kaspersky Security Center. The installation package contains the settings required to install the application and ensure its operation immediately after the installation. The values of the settings correspond to the default values of the application settings. The installation package is created using the .kud file included in the application distribution kit. Kaspersky Endpoint Security installation package is common for all supported operating systems and processor architecture types.

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent), you need to configure the settings in the autoinstall.ini configuration file and include this file in the installation package.

You can deploy Kaspersky Endpoint Security on the devices in the corporate network in several ways.

The Kaspersky Security Center Administration Console supports the following main deployment methods:

  • Installing the application using the Remote Installation Wizard.
  • Installing the application using the remote installation task.

Kaspersky Security Center Web Console supports the following main deployment methods:

  • Installing the application using the Protection Deployment Wizard.
  • Installing the application using the remote installation task.

For a description of the deployment procedures, see the Kaspersky Security Center Help.

If necessary, you can view the remote application installation log in the Web Console in the properties of the managed device on the Advanced tab in the Remote diagnostics section or in the Administration Console using the remote diagnostics utility.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, then activation of the application during installation and automatic license key distribution are not supported. If Kaspersky Endpoint Security receives information about the license from the Protection Server after connecting to the SVM; there is no need to activate Kaspersky Endpoint Security separately.

To use Kaspersky Security Center to manage Kaspersky Endpoint Security installed on client devices, you need to put these devices in

. Before starting Kaspersky Endpoint Security installation, you can create Kaspersky Security Center administration groups to which you want to move the devices with Kaspersky Endpoint Security installed, and configure the rules to automatically move the devices to these administration groups. If rules for moving devices to the administration groups are not configured, Kaspersky Security Center moves all the devices that have the Administration Agent installed and are connected to Administration Server to the Unassigned devices list. In this case, you need to manually move computers to the administration groups (refer to the Kaspersky Security Center Help for details).

In this section

Creating an installation package in Kaspersky Security Center Administration Console

Creating an installation package in Kaspersky Security Center Web Console

Preparing an archive with application databases in order to create an installation package with integrated databases

Autoinstall.ini configuration file settings

Getting started using Kaspersky Security Center

Activating the application using Kaspersky Security Center

Page top

[Topic 236944]

Creating an installation package in Kaspersky Security Center Administration Console

Before creating an installation package for Kaspersky Endpoint Security, you need to prepare the files to be included in the package.

To prepare files for creating an installation package:

  1. Download the kesl.zip archive from the application download page. It is located in the Kaspersky Endpoint Security for Linux (Additional distribution -> Files for Product remote installation).
  2. Unpack the kesl.zip archive to a folder accessible to Kaspersky Security Center Administration Server. Place the distribution files, that correspond to the type of operating system where you want to install the application and the type of its package manager, to the same folder:
    • To install Kaspersky Endpoint Security:
      • kesl-12.0-<build number>.i386.rpm (for 32-bit operating systems with rpm)
      • kesl_12.0-<build number>_i386.deb (for 32-bit operating systems with dpkg)
      • kesl-12.0-<build number>.x86_64.rpm (for 64-bit operating systems with rpm)
      • kesl_12.0-<build number>_amd64.deb (for 64-bit operating systems with dpkg)
      • kesl-12.0-<build number>.aarch64.rpm (for 64-bit operating systems with rpm for the Arm architecture)
      • kesl_12.0-<build number>_arm64.deb (for 64-bit operating systems with dpkg for the Arm architecture)
    • to install the GUI:
      • kesl-gui-12.0-<build number>.i386.rpm (for 32-bit operating systems with rpm)
      • kesl-gui_12.0-<build number>_i386.deb (for 32-bit operating systems with dpkg)
      • kesl-gui-12.0-<build number>.x86_64.rpm (for 64-bit operating systems with rpm)
      • kesl-gui_12.0-<build number>_amd64.deb (for 64-bit operating systems with dpkg)
      • kesl-gui-12.0-<build number>.aarch64.rpm (for 64-bit operating systems with rpm for the Arm architecture)
      • kesl-gui_12.0-<build number>_arm64.deb (for 64-bit operating systems with dpkg for the Arm architecture)

      If you do not want to install a graphical user interface, do not use these files; this will make the installation package smaller.

      If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the graphical user interface is not supported.

    If the graphical user interface will not be used, you need to set the USE_GUI=No parameter-value pair in the autoinstall.ini configuration file. Otherwise, the installation will fail.

    If you want to use the created installation package to install the application on several types of operating systems or package managers, place the files for all the required types of operating systems and package managers in the folder.

  3. If you plan to use Kaspersky Endpoint Security in standalone mode and want to use previously downloaded databases, place the prepared archives with databases for all required operating system types in the folder. Open the autoinstall.ini configuration file and specify UPDATE_EXECUTE=no. The autoinstall.ini file is located in the folder where you unpacked the kesl.zip archive.
  4. If you are planning to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments or you want to specify the initial configuration parameters of the application, open the autoinstall.ini configuration file and make the necessary changes. The autoinstall.ini file is located in the folder where you unpacked the kesl.zip archive.

    If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments, you need to set the KSVLA_MODE=yes setting in the autoinstall.ini configuration file.

To create an installation package for Kaspersky Endpoint Security in the Administration Console of Kaspersky Security Center:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the console tree, select AdditionalRemote installationInstallation packages.
  3. Click the Create installation package button.

    The wizard for creating an installation package will start.

  4. In the wizard window that opens, click the Create installation package for a Kaspersky application button.
  5. Enter the name of the new installation package and proceed to the next step.
  6. Select Kaspersky Endpoint Security distribution package. To do this, open a standard browsing window using the Browse button and specify the path to the kesl.kud file. The file is located in the folder where you unpacked the kesl.zip archive.

    The application name is displayed in the window.

    Proceed to the next step.

  7. Read the License Agreement between you and Kaspersky and the Privacy Policy that describes the processing and transmission of data.

    To continue creating the installation package, you must confirm that you have read and accept the full terms of the End User License Agreement and the Privacy Policy. To confirm, in the window that opens, select both check boxes.

    Proceed to the next step.

  8. The wizard downloads the files required to install the application to Kaspersky Security Center Administration Server. Wait for the download to finish.
  9. Complete the wizard.

The created installation package is located in the tree of the Administration Console of Kaspersky Security Center in the AdditionalRemote installationInstallation packages folder. You can use the same installation package many times.

Page top

[Topic 247278]

Creating an installation package in Kaspersky Security Center Web Console

In Kaspersky Security Center Web Console, you can create an installation package in one of the following ways:

  • From an archive file that you have prepared previously.
  • From a distribution kit hosted on Kaspersky servers.

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments or want to configure additional application installation settings, you need to prepare the files to be included in the installation package and create a package from an archive.

If you plan to use Kaspersky Endpoint Security in standalone mode and do not need to configure additional installation settings, you can create an installation package from a distribution kit hosted on Kaspersky servers.

To prepare an archive for creating an installation package:

  1. Download the kesl.zip archive from the application download page. It is located in the Kaspersky Endpoint Security for Linux (Additional distribution -> Files for Product remote installation).
  2. Unpack the kesl.zip archive to a folder accessible to Kaspersky Security Center Administration Server. Place the distribution files, that correspond to the type of operating system where you want to install the application and the type of its package manager, to the same folder:
    • To install Kaspersky Endpoint Security:
      • kesl-12.0-<build number>.i386.rpm (for 32-bit operating systems with rpm)
      • kesl_12.0-<build number>_i386.deb (for 32-bit operating systems with dpkg)
      • kesl-12.0-<build number>.x86_64.rpm (for 64-bit operating systems with rpm)
      • kesl_12.0-<build number>_amd64.deb (for 64-bit operating systems with dpkg)
      • kesl-12.0-<build number>.aarch64.rpm (for 64-bit operating systems with rpm for the Arm architecture)
      • kesl_12.0-<build number>_arm64.deb (for 64-bit operating systems with dpkg for the Arm architecture)
    • to install the GUI:
      • kesl-gui-12.0-<build number>.i386.rpm (for 32-bit operating systems with rpm)
      • kesl-gui_12.0-<build number>_i386.deb (for 32-bit operating systems with dpkg)
      • kesl-gui-12.0-<build number>.x86_64.rpm (for 64-bit operating systems with rpm)
      • kesl-gui_12.0-<build number>_amd64.deb (for 64-bit operating systems with dpkg)
      • kesl-gui-12.0-<build number>.aarch64.rpm (for 64-bit operating systems with rpm for the Arm architecture)
      • kesl-gui_12.0-<build number>_arm64.deb (for 64-bit operating systems with dpkg for the Arm architecture)

      If you do not want to install a graphical user interface, do not use these files; this will make the installation package smaller.

      If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the graphical user interface is not supported.

    If the graphical user interface will not be used, you need to set the USE_GUI=No parameter-value pair in the autoinstall.ini configuration file. Otherwise, the installation will fail.

    If you want to use the created installation package to install the application on several types of operating systems or package managers, place the files for all the required types of operating systems and package managers in the folder.

  3. If you plan to use Kaspersky Endpoint Security in standalone mode and want to use previously downloaded databases, place the prepared archives with databases for all required operating system types in the folder. Open the autoinstall.ini configuration file and specify UPDATE_EXECUTE=no. The autoinstall.ini file is located in the folder where you unpacked the kesl.zip archive.
  4. If you are planning to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments or you want to specify the initial configuration parameters of the application, open the autoinstall.ini configuration file and make the necessary changes. The autoinstall.ini file is located in the folder where you unpacked the kesl.zip archive.

    If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments, you need to set the KSVLA_MODE=yes setting in the autoinstall.ini configuration file.

  5. Place all prepared files in an archive in ZIP, CAB, TAR, or TAR.GZ format with any name.

To create an installation package for Kaspersky Endpoint Security in Kaspersky Security Center Web Console:

  1. In the main Web Console window, select one of the following sections:
    • Device discovery and deploymentDeployment and assignmentInstallation packages.
    • OperationsRepositoriesInstallation packages.

    A list of installation packages available on the Administration Server opens.

  2. Click Add.

    The wizard for creating an installation package will start. Follow the instructions of the Wizard.

  3. On the first page of the wizard, select the method for creating an installation package:
    • Create an installation package from a file. The installation package will be created from an archive that you have prepared in advance. You need to select this option if you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments.
    • Create an installation package for the Kaspersky application. The installation package will be created from a distribution package located on Kaspersky servers.

    Kaspersky Security Center Cloud Console does not allow creation of installation packages from a file.

  4. Depending on the selected package creation method:
    • Specify the package name, click the Browse button, and specify the path to the archive that you have prepared for creating the installation package.
    • Select Kaspersky Endpoint Security distribution package. In the window on the right, read the information about the distribution package and click the Download and create installation package button. The installation package creation process starts.
  5. During creation of the installation package, accept the terms of the End User License Agreement and Privacy Policy. When prompted by the Wizard, read the License Agreement between you and Kaspersky and the Privacy Policy that describes the processing and transmission of data. To continue creating the installation package, you must confirm that you have read and accept the full terms of the End User License Agreement and the Privacy Policy.

The installation package will be created and added to the list of installation packages. Using the installation package, you can install the application on devices in the corporate network or update the application version.

In the installation package properties, you can also configure the application installation settings (see the table below) on the Settings tab.

An installation package for Kaspersky Endpoint Security cannot be configured in Kaspersky Security Center Web Console versions lower than 14.2. Use the autoinstall.ini configuration file to configure settings.

Installation package settings

Section

Description

Specify the locale.

Select this check box to specify the locale used during the application operation. The locale in the format specified by RFC 3066. If this setting is not specified, the default locale is used.

Activate the application

Select the check box to activate the application.

You can also activate the application after installation.

This setting applies only if the application is used in standalone mode.

Select the update source.

Specify the update source:

  • Kaspersky update servers.
  • Kaspersky Security Center.
  • Other source in the local or global network.

This setting applies only if the application is used in standalone mode.

Run the database update task after installation.

Select this check box to run the Update task after the application is installed.

This setting applies only if the application is used in standalone mode.

Specify the proxy server settings.

Select this check box to specify the address of the proxy server used to connect to the Internet.

This setting applies only if the application is used in standalone mode.

Install kernel source

Select this check box to automatically start of kernel module compilation.

Use the graphical user interface.

Select this check box to enable the use of the graphical user interface.

This setting applies only if the application is used in standalone mode.

Specify a user with the admin role

Select the check box to specify the user to be assigned the administrator (admin) role.

Configure SELinux automatically

Select the check box to automatically configure SELinux to work with Kaspersky Endpoint Security.

Page top

[Topic 266691]

Preparing an archive with application databases in order to create an installation package with integrated databases

You can create an installation package for remote installation and include pre-downloaded application databases in it. This may be useful, for example, if you are installing the application on a device with the Astra Linux Special Edition operating system. If you are using an installation package with integrated databases, the application is installed with the databases already functional; in this case, you do not need to update the databases immediately after installation.

To create an archive with databases for installing the application:

  1. Install and perform the initial configuration of Kaspersky Endpoint Security on the device using the command line or using Kaspersky Security Center.
  2. Update the application databases. You can update the databases during the initial configuration of the application or after installation by running an Update task in the command line or an Update task in the Kaspersky Security Center Administration Console or Kaspersky Security Center Web Console.
  3. Copy the contents of the /var/opt/kaspersky/kesl/private/updates/ directory to one of the following subdirectories, depending on the architecture of the operating system for which you are creating the installation package with integrated databases: /i386/, /x86_64/, or /arm64/.
  4. Place the directories with the databases into a kesl-bases.tgz archive, preserving the structure of nested directories. You can place only one subdirectory with databases for the required architecture of the operating system in the archive, or if you plan to create an installation package for installation on several operating systems with different architectures, you can place all the subdirectories with databases (/i386/, /x86_64/, or /arm64/) into a single archive for different architectures.
  5. You can use the created archive with application databases when creating an installation package in the Kaspersky Security Center Administration Console or Kaspersky Security Center Web Console.
Page top

[Topic 236945]

Autoinstall.ini configuration file settings

In the autoinstall.ini configuration file, you can specify the settings shown in the table below. The set of applicable settings depends on the application usage mode.

Autoinstall.ini configuration file settings

Setting

Description

Values

KSVLA_MODE

Kaspersky Endpoint Security usage mode.

yes - Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent).

no (default value) – Kaspersky Endpoint Security is used in standalone mode.

SERVER_MODE

The role of the protected virtual machine (server or workstation).

The setting is applied only if the application is used in Light Agent mode.

yes (default value) – the protected virtual machine is used as a server.

no – the protected virtual machine is used as a workstation.

VDI_MODE

Enabling VDI protection mode to optimize application performance on temporary virtual machines.

The setting is applied only if the application is used in Light Agent mode.

yes – enable VDI protection mode. This is recommended if you are installing Kaspersky Endpoint Security on a virtual machine template that will be used to create temporary virtual machines.

no (default value) – do not enable VDI protection mode.

EULA_AGREED

Required setting.

Acceptance of the terms of the End User License Agreement.

yes (default value) – accept the terms of the End User License Agreement to continue the application installation procedure.

no – do not accept the End User License Agreement. The application installation will be terminated.

PRIVACY_POLICY_AGREED

Required setting.

Acceptance of the terms of the Privacy Policy.

yes (default value) – accept the terms of the Privacy Policy to continue the application installation procedure.

no: do not accept the Privacy Policy. The application installation will be terminated.

USE_KSN

Required setting.

Enabling Kaspersky Security Network usage: To enable the use of KSN, the terms of the Kaspersky Security Network Statement must be accepted.

yes – accept the terms and conditions of the Kaspersky Security Network Statement and enable the use of KSN.

no – (default value) do not accept the Kaspersky Security Network Statement.

If Kaspersky Endpoint Security is used in standalone mode and you have enabled the use of KSN, the application's cloud mode is automatically enabled. In this mode, Kaspersky Endpoint Security uses a lightweight version of the malware databases.

GROUP_CLEAN

Required setting.

Removing users from the kesladmin and keslaudit privileged groups.

yes - Remove users from the privileged groups. If the value is yes and there is no nogroup group, the installation will fail and you will be prompted to manually remove users from privileged groups.

no - Do not remove users from the privileged groups.

LOCALE

Optional setting.

The locale used for the application events sent to Kaspersky Security Center.

The locale in the format specified by RFC 3066.

If the Locale setting is not specified, the operating system locale is used. If the application fails to determine the operating system localization language or the operating system localization is not supported, the default value will be used – en_US.utf8.

The locale of the graphical interface and the application command line depends on the value of the LANG environment variable. If the locale that is not supported by Kaspersky Endpoint Security is specified as the value of the LANG environment variable, the graphical interface and the command line are displayed in English.

INSTALL_LICENSE

Activation code or key file.

This setting applies only if the application is used in standalone mode.

 

UPDATER_SOURCE

Update source.

This setting applies only if the application is used in standalone mode.

SCServer – use the Kaspersky Security Center Administration Server as the update source.

KLServers – use Kaspersky servers as the update source. This value is used by default.

Update source address

PROXY_SERVER

Address of the proxy server used to connect to the Internet.

This setting applies only if the application is used in standalone mode.

Proxy server address

UPDATE_EXECUTE

Start application database update task during setup.

This setting applies only if the application is used in standalone mode.

yes (default value) – start the update task.

no – do not start update task.

KERNEL_SRCS_INSTALL

Automatic start of kernel module compilation.

yes (default value) — compile the kernel module.

no – do not compile kernel module.

USE_GUI

Use of the graphical user interface.

This setting applies only if the application is used in standalone mode.

yes – Enable use of the graphical user interface.

no (default value) – Disable the use of the graphical user interface.

ADMIN_USER

A user assigned the administrator role (admin).

No

CONFIGURE_SELINUX

Automatic configuration of SELinux for working with Kaspersky Endpoint Security.

yes (default value) – automatically configure SELinux to work with Kaspersky Endpoint Security.

no – do not automatically configure SELinux to work with Kaspersky Endpoint Security.

DISABLE_PROTECTION

Disable protection components and scan tasks after the application is installed.

An installation with protection components disabled can be convenient, for example, in order to reproduce a problem in the operation of the application and create a trace file.

If you enable the necessary components and tasks after installing the application with the DISABLE_PROTECTION=yes parameter, the enabled components and tasks will continue to work after the application is restarted.

yes - Disable protection components and scan tasks when the application is started after installation.

no - Do not disable protection components and scan tasks when the application is started after installation.

If you want to change the settings in the autoinstall.ini configuration file, specify the values of settings in the following format: <setting_name>=<setting_value> (the application does not process spaces between the name of a setting and its value).

Page top

[Topic 202127]

Getting started using Kaspersky Security Center

After deploying Kaspersky Endpoint Security through Kaspersky Security Center, you must prepare the application for operation. The actions to be performed depend on the mode in which you plan to use Kaspersky Endpoint Security.

Standalone mode

If you plan to use Kaspersky Endpoint Security in standalone mode, after deploying the application, you need to do the following:

  • Activate the application. You can create and execute an activation task using the Administration Console or Kaspersky Security Center Web Console, as well as distribute the license key to the devices from the Kaspersky Security Center key storage.
  • Update application databases and modules using the Administration Console or Kaspersky Security Center Web Console. You can use the Update task, which is created automatically by the initial configuration wizard of Kaspersky Security Center after installing the MMC administration plug-in or the Kaspersky Endpoint Security web administration plug-in.

    Kaspersky Endpoint Security protects the device only after the application databases are updated.

  • Configure a for centralized management of the application using Kaspersky Security Center Administration Console or Web Console. You can use a policy that is created automatically by the initial configuration wizard of Kaspersky Security Center after installing the administration MMC plug-in or the Kaspersky Endpoint Security administration web plug-in.

    You can also configure the application management tasks using the Administration Console or the Web Console.

Light Agent mode

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments, after deploying the application, perform the following actions:

  1. Configure SVM detection settings for Light Agents. To do this, you need to create and configure a policy for centralized application management on client devices. You can use the Administration Console or the Web Console to work with policies.

    You need to configure the following settings in the policy:

    • Settings for connecting Light Agents to the Integration Server.
    • Settings for connecting Light Agents to SVMs.
  2. Make sure that a connection is established between Light Agents and the SVMs and the Integration Server.

    You can obtain information about the connection by using Kaspersky Endpoint Security commands on the protected virtual machine:

    • You can view information about connecting to SVMs using the kesl-control [-V] --svm-info command.
    • You can view information about connecting to the Integration Server using the kesl-control [-V] --viis-info command.
  3. Make sure that Kaspersky Endpoint Security used as a Light Agent receives information about the license under which Kaspersky Hybrid Cloud Security for Virtualization Light Agent is activated.

    After activating the solution on SVMs and connecting Light Agents to the SVMs, the Protection Server component sends license information to Light Agents. Information about the license used by Kaspersky Endpoint Security as part of the solution can be viewed on the protected virtual machine using the kesl-control -L --query command.

  4. Make sure that database updates required for Light Agent to operate are installed on the protected virtual machines.

    Databases on protected virtual machines are updated using a special Update task, in which a folder on the SVM is specified as the update source. The update task starts automatically.

    You can check how up-to-date the databases are on a protected virtual machine with Light Agent by using the kesl-control --app-info command.

    You can also configure the application management tasks using the Administration Console or the Web Console.

Page top

[Topic 202128]

Activating the application using Kaspersky Security Center

If you plan to use Kaspersky Endpoint Security in Light Agent mode to protect virtual environments, you do not need to activate the application separately after installation. You activate Kaspersky Hybrid Cloud Security for Virtualization Light Agent on the Protection Server (a component of Kaspersky Hybrid Cloud Security for Virtualization Light Agent) by adding a license key to the SVM.

Activation is the process of activating a license that allows you to use a fully functional version of the application until the license expires. The application activation process involves adding a license key.

You can activate the application remotely using Kaspersky Security Center in the following ways:

  • Using the application activation task.

    This method allows you to add a license key to a specific device or the devices included in an administration group. You can create and run an activation task using the Administration Console or Kaspersky Security Center Web Console.

  • By distributing a license key stored on Kaspersky Security Center Administration Server to the client devices.

    This method lets you automatically add a key to the client devices that are already connected to Kaspersky Security Center, and to new client devices. To use this method, first add the key to the key storage on Kaspersky Security Center Administration Server.

  • By adding the key to the Kaspersky Endpoint Security installation package.

    This method allows adding a key in the properties of the installation package when deploying Kaspersky Endpoint Security. The application will be activated automatically after installation.

You can use Kaspersky Security Center Administration Console or Kaspersky Security Center Web Console to create the tasks for application activation, adding a key to the key storage, and distributing the key to the client devices.

Activation using Kaspersky Security Center Web Console

Before creating an activation task or a key distribution task, add the key to Kaspersky Security Center Administration Server key storage.

To add a key to Kaspersky Security Center key storage using the Web Console:

  1. In the Web Console main window, select the Operations → Licensing → Kaspersky Licenses.
  2. Click Add.
  3. In the window that opens, select how to add the key to the repository:
    • Enter the activation code to add a key using an activation code.
    • Add a key file to add a key using a key file.
  4. Depending on the key adding method you selected at the previous step, do one of the following:
    • Enter the activation code and click Submit.
    • Click the Select key file button and in the window that opens, select the file with the key extension.
  5. Click Close.

The added key will appear in the list of keys.

To activate the application using the Web Console by means of the Add Key task:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. Click Add.

    The Task Wizard starts.

  3. Configure the task settings:
    1. In the Application drop-down list, select the application name: Kaspersky Endpoint Security.
    2. In the Task type drop-down list, select Add Key.
    3. In the Task name field, enter a brief description, such as Activation of Kaspersky Endpoint Security.
    4. In the Select devices to which the task will be assigned section, select the task scope. Click Next.
  4. Select devices according to the selected task scope option. Click Next.

    The Kaspersky Security Center key storage window opens.

  5. If you have previously added a key to Kaspersky Security Center key storage, select the key from in the list and click Next.
  6. If the required key cannot be found in the key storage, click the Add key button.
    1. In the window that opens, select how to add the key to the repository:
      • Enter the activation code to add a key using an activation code.
      • Add a key file to add a key using a key file.
    2. Depending on the key adding method you selected at the previous step, do one of the following:
      • Enter the activation code and click Submit.
      • Click the Select key file button and in the window that opens, select the file with the key extension.
    3. Read the information about the key and click Close.
    4. The added key will appear in the list of keys. Select it from the list and click Next.
  7. Read the information about the license and click Next.
  8. Complete the wizard.

    A new task will be displayed in the list of tasks.

  9. Select the check box next to the task. Click the Start button.

In the properties of the Add Key task, you can add a reserve key to the device. The reserve key becomes active when the license associated with the active key expires or when the active key is deleted. Availability of a reserve key allows you to avoid application functionality limitation when your license expires.

To activate the application using the Web Console by distributing a key stored on Kaspersky Security Center Administration Server to the devices:

  1. In the Web Console main window, select the OperationsLicensing → Kaspersky Licenses.
  2. Open the key properties using the link with the name of the application for that the key is intended to.
  3. On the General tab, select the Automatically distribute a license key to managed devices check box.
  4. Click Save.

The license key is automatically distributed to the appropriate client devices. During the automatic distribution of a key as an active or a reserve key, the licensing limit on the number of devices (set in the key properties) is taken into account. If the licensing limit is reached, distribution of this key to the devices stops automatically. You can view the number of devices to which the key has been added and other information in the key properties on the Devices tab.

You can control license usage using Kaspersky Security Center Web Console in the following ways:

  • View the Key usage report for the organization infrastructure (Monitoring and reportsReports).
  • View the statuses of the managed devices (DevicesManaged devices). If the application is not activated, the device will have the Warning_Status status and the Protection disabled status description.
  • View the key properties (OperationsLicensingKaspersky licenses).

Special considerations for the activation process in Kaspersky Security Center Cloud Console

A trial version is provided for the Kaspersky Security Center Cloud Console. The trial version is a special version of Kaspersky Security Center Cloud Console designed to familiarize a user with the features of the application. In this version, you can perform actions in a workspace for a period of 30 days. All managed applications, including Kaspersky Endpoint Security, are automatically activated under Kaspersky Security Center Cloud Console trial license. However, you cannot activate Kaspersky Endpoint Security using its own trial license when the trial license for the Kaspersky Security Center Cloud Console expires. For detailed information about Kaspersky Security Center Cloud Console, please refer to the Kaspersky Security Center Cloud Console documentation.

The trial version of Kaspersky Security Center Cloud Console does not allow you to subsequently switch to a commercial version. Any trial workspace will be automatically deleted with all its contents after the 30-day period expires.

Page top

[Topic 236566]

Running the application on Astra Linux in closed software environment mode

This section describes how to start the application in the Astra Linux Special Edition operating system.

For Astra Linux Special Edition (operational update 1.7) and Astra Linux Special Edition (operational update 1.6)

To start the application on the Astra Linux Special Edition (operational update 1.7) or Astra Linux Special Edition (operational update 1.6) operating system:

  1. Specify the following setting in the /etc/digsig/digsig_initramfs.conf file:

    DIGSIG_ELF_MODE=1

  2. Install the compatibility package:

    apt install astra-digsig-oldkeys

  3. Create a directory for the application key:

    mkdir -p /etc/digsig/keys/legacy/kaspersky/

  4. Locate the application key (/opt/kaspersky/kesl/shared/kaspersky_astra_pub_key.gpg) in the directory created at the previous step:

    cp kaspersky_astra_pub_key.gpg /etc/digsig/keys/legacy/kaspersky/

  5. Update the initramfs image:

    update-initramfs -u -k all

For Astra Linux Special Edition (operational update 1.5)

To run the application in the Astra Linux Special Edition (operational update 1.5) operating system:

  1. Specify the following setting in the /etc/digsig/digsig_initramfs.conf file:

    DIGSIG_LOAD_KEYS=1

    DIGSIG_ENFORCE=1

  2. Create a directory for the application key:

    mkdir -p /etc/digsig/keys/legacy/kaspersky/

  3. Locate the application key (/opt/kaspersky/kesl/shared/kaspersky_astra_pub_key.gpg) in the directory created at the previous step:

    cp kaspersky_astra_pub_key.gpg /etc/digsig/keys/legacy/kaspersky/

  4. Update the initramfs image:

    sudo update-initramfs -u -k all

The application graphical user interface can be used during mandatory access control sessions.

Page top

[Topic 237162]

Configuring allowing rules in the SELinux system

Manually configuring SELinux for working with the application

If SELinux couldn't s be configured automatically during the initial configuration of the application, or if you declined automatic configuration, you can manually configure SELinux to work with Kaspersky Endpoint Security.

To configure SELinux to work with the application:

  1. Switch SELinux to permissive mode:
    • If SELinux has been activated, run the following command:

      # setenforce Permissive

    • If SELinux was disabled, set the SELINUX=permissive setting in the configuration file / etc / selinux / config and restart the operating system.
  2. Make sure the semanage utility is installed on the system. If the utility is not installed, install the policycoreutils-python or policycoreutils-python-utils package, depending on the package manager.
  3. If you use a custom SELinux policy rather than the default targeted policy, assign a label for the following Kaspersky Endpoint Security source executable files in accordance with the SELinux policy used:
    • /var/opt/kaspersky/kesl/12.0.<build number>_<installation timestamp>/opt/kaspersky/kesl/libexec/kesl
    • /var/opt/kaspersky/kesl/12.0.<build number>_<installation timestamp>/opt/kaspersky/kesl/bin/kesl-control
    • /var/opt/kaspersky/kesl/12.0.<build number>_<installation timestamp>/opt/kaspersky/kesl/libexec/kesl-gui
    • /var/opt/kaspersky/kesl/12.0.<build number>_<installation timestamp>/opt/kaspersky/kesl/shared/kesl
  4. Run the following tasks:
    • File Threat Protection task:

      kesl-control --start-task 1

    • Critical Areas Scan task:

      kesl-control --start-task 4 -W

    It is recommended to run all the tasks that you plan to run while using Kaspersky Endpoint Security.

  5. Start the graphical user interface if you plan to use it.
  6. Ensure that there are no errors in the audit.log file:

    grep kesl /var/log/audit/audit.log

  7. If there are errors in the audit.log file, create and download a new rule module based on the blocking records in order to fix the errors, and then relaunch all the tasks that you plan to run while using Kaspersky Endpoint Security.

    If new audit messages related to Kaspersky Endpoint Security appear, the file with the rule module file must be updated.

  8. Switch SELinux to blocking mode:

    # setenforce Enforcing

If you use a custom SELinux policy, manually assign a label to Kaspersky Endpoint Security source executable files after installing application updates (follow steps 1, 3–8).

You can find more information in the documentation for your operating system.

Configuring SELinux to run the "Start process" task

If SELinux is installed in your operating system in Enforcing mode, starting the Start process task requires additional configuration of SELinux.

To configure SELinux to run the "Start process" task

  1. Switch SELinux to permissive mode:
    • If SELinux has been activated, run the following command:

      # setenforce Permissive

    • If SELinux was disabled, set the SELINUX=permissive setting in the configuration file / etc / selinux / config and restart the operating system.
  2. Make sure the semanage utility is installed on the system. If the utility is not installed, install the policycoreutils-python or policycoreutils-python-utils package, depending on the package manager.
  3. Start the "Start process" task.
  4. Ensure that there are no errors in the audit.log file:

    grep kesl /var/log/audit/audit.log

  5. If errors are present in the audit.log file, create and load a new rules module based on blocking rules to fix the errors, then run the "Start process" task again.
  6. Switch SELinux to blocking mode:

    # setenforce Enforcing

Page top

[Topic 246380]

Updating the application from a previous version

Only Kaspersky Endpoint Security 11.4.0 for Linux can be updated to Kaspersky Endpoint Security 12.0 for Linux.

Upgrading earlier Kaspersky Endpoint Security versions to version 12.0 is not supported. If you have an earlier version of Kaspersky Endpoint Security installed, you need to first uninstall it and then install Kaspersky Endpoint Security 12.0 for Linux.

During an update of Kaspersky Endpoint Security, standalone mode is selected automatically. If you plan to use Kaspersky Endpoint Security 12.0 for Linux in Light Agent mode to protect virtual environments (as part of the Kaspersky Security for Virtualization Light Agent solution), you need to first uninstall the previous version of the application and then install Kaspersky Endpoint Security 12.0 for Linux.

You need to prepare to install before installing Kaspersky Endpoint Security.

You can update Kaspersky Endpoint Security 12.0 for Linux in one of the following ways:

During the update, the application settings and the application log are migrated to the new version of the application. If the transfer of application settings fails for any reason, the application is set to the default values.

If an error occurs while updating the application, the update is rolled back and the previous version of the application is started. In this case, an error message will be displayed, but the package manager (rpm/dpkg) will indicate the new version.

Even if Kaspersky Endpoint Security is launched before the update process start, if the update is completed successfully, a new application version is launched.

After updating the application, you need to run the Database Update task.

In this Help section

Updating the application using the command line

Updating the application using Kaspersky Security Center

Page top

[Topic 236426]

Updating the application using the command line

Follow the procedure below to update the previous version of the application to Kaspersky Endpoint Security 12.0 for Linux.

Application update consists of the following steps:

  1. Start installation of the Kaspersky Endpoint Security 12.0 for Linux package appropriate for the package manager.

    If you have a graphical user interface installed, then you also need to start the package containing the files of the graphical user interface.

  2. Acceptance of the terms of the End User License Agreement.

    If the terms of the End User License Agreement changed in the new version of the application, you need to accept the new terms of the End User License Agreement. Read the new version of the License Agreement located in the ~/.kesl/<application version>/ksn_license.<language ID> directory. If you do not accept the terms of the End User License Agreement, the application is not updated.

  3. Acceptance of the terms of the Privacy Policy.

    If the terms of the Privacy Policy changed in the new version of the application, you need to accept the new terms of the Privacy Policy. Read the new version of the Privacy Policy located in the ~/.kesl/<application version>/ksn_license.<language ID> directory. If you do not accept the terms of the Privacy Policy, the application is not updated.

  4. Acceptance of the Kaspersky Security Network Statement.

    If the terms of the Kaspersky Security Network Statement changed in the new version of the application, you need to accept or decline the new terms of use for participating in Kaspersky Security Network. Read the new version of the document located in the (~/.kesl/<application version>/ksn_license.<language ID>) directory. Refusal to participate in Kaspersky Security Network does not interrupt the Kaspersky Endpoint Security update process. You can enable, disable, or change Kaspersky Security Network mode later.

    If you used KSN and accepted the conditions of the Kaspersky Security Network Statement in a previous version of the application, you need to accept the conditions of the Kaspersky Security Network Statement when updating the application. Otherwise, use of KSN is disabled.

  5. Automatic application restart.

If the terms of the End User License Agreement, Privacy Policy, or Kaspersky Security Network Statement have changed in the new application version, the application update finishes with an error. In this case, you need to read the new version of the document and confirm that you have fully read and accepted its conditions. To do this, use the KESL_EULA_AGREED=yes, KESL_PRIVACY_POLICY_AGREED=yes and KESL_USE_KSN=yes/no environment variables.

To update the application:

  1. Install the application package using the following command, depending on the package manager. If you have the graphical user interface of the previous version of the application installed, then you also need to start the package containing the files of the graphical user interface.
    • for an RPM package.

      If you want to upgrade the GUI package of Kaspersky Endpoint Security version 11.4.0 to version 12.0, you must first uninstall the GUI package of version 11.4.0 using the command rpm -e --nodeps kesl-gui, and then install the GUI package of version 12.0.

      # [KESL_EULA_AGREED=yes] [KESL_PRIVACY_POLICY_AGREED=yes] [KESL_USE_KSN=yes/no] rpm -U --replacefiles --replacepkgs kesl-12.0-<build number>.<arch>.rpm [kesl-gui-12.0-<build number>.<arch>.rpm]

      where <arch> is the architecture type:

      • i386 – for 32-bit operating systems
      • x86_64 – for 64-bit operating systems
      • aarch64 – for 64-bit operating systems for the Arm architecture
    • for a DEB package:

      # [KESL_EULA_AGREED=yes] [KESL_PRIVACY_POLICY_AGREED=yes] [KESL_USE_KSN=yes/no] apt-get install ./kesl_12.0-<build number>_<arch>.deb [./kesl-gui_12.0-<build number>_<arch>.deb]

      where <arch> is the architecture type:

      • i386 – for 32-bit operating systems
      • amd64 – for 64-bit operating systems
      • arm64 – for 64-bit operating systems for the Arm architecture
  2. Kaspersky Endpoint Security will restart automatically.
  3. Some operating systems may require a restart. The application will show a corresponding message, if necessary.

Changes to the application settings made after the update is complete and before the application restarts are not saved.

Page top

[Topic 247941]

Updating the application using Kaspersky Security Center

Follow the procedure below to use Kaspersky Security Center to update the previous version of the application to Kaspersky Endpoint Security 12.0 for Linux.

To update the application managed by the Kaspersky Security Center policy:

  1. Update the Network Agent to the latest version (for details, refer to Kaspersky Security Center documentation).

    If the Network Agent is not updated, the application cannot be managed using Kaspersky Security Center.

    On a device running the Astra Linux Special Edition operating system, we recommend to update Network Agent remotely using Kaspersky Security Center, since updating using the command line in the Kaspersky Security Center administration console creates a new copy of the same managed device, and the old one becomes inaccessible.

    The application continues working correctly during the Network Agent update.

  2. Install Kaspersky Endpoint Security 12.0 for Linux using Kaspersky Security Center.

    If you want to update the application, but do not want to enable the graphical user interface, specify the USE_GUI=No setting value in the autoinstall.ini configuration file.

  3. Kaspersky Endpoint Security will restart automatically.
  4. Some operating systems may require a restart. The application will show a corresponding message, if necessary.

Refer to the Kaspersky Security Center documentation for more details about this type of application update.

Page top

[Topic 197919]

Uninstalling the application

You can uninstall Kaspersky Endpoint Security locally or using Kaspersky Security Center by means of the Administration Console or Kaspersky Security Center Web Console.

While the application is being uninstalled, all Kaspersky Endpoint Security tasks are stopped.

You can perform the following actions when uninstalling the application:

  • Uninstall the application package and the graphical user interface package at the same time.
  • Uninstall only the application package if the graphical user interface package is not installed.

    It is not possible to uninstall only the application package if the graphical user interface package is installed.

  • Remove only the graphical user interface package.

After uninstalling the application, all information saved by the application is deleted, except for the license database. Installed application certificates are also removed. The license database is saved, and you can use it to reinstall the application.

If the application was installed in a systemd, the systemd settings are restored to their initial state after the application uninstallation.

In this Help section

Uninstalling the application using the command line

Uninstalling the application using the Administration Console

Uninstalling the application using Kaspersky Security Center Web Console

Page top

[Topic 236428]

Uninstalling the application using the command line

The application automatically performs the uninstallation procedure. After the uninstallation procedure is completed, the application displays a message about the uninstallation results.

Uninstalling the application package and the graphical user interface package

To uninstall the application and the graphical user interface installed from the RPM packages, carry out the following command:

# rpm -e kesl kesl-gui

To uninstall the application and the graphical user interface installed from the DEB packages, carry out the following command:

# apt-get purge kesl kesl-gui

Uninstalling the application package without the graphical user interface package

To uninstall the application installed from the RPM package without removing the graphical user interface, carry out the following command:

# rpm -e kesl

To uninstall the application installed from the DEB package without removing the graphical user interface, carry out the following command:

# apt-get purge kesl

Removing the graphical user interface package

To remove the graphical user interface that was installed from the RPM package, execute the following command:

# rpm -e kesl-gui

To remove the graphical user interface that was installed from the DEB package, execute the following command:

# apt-get purge kesl-gui

Removing Network Agent

To uninstall the Network Agent installed on a 32-bit operating system from an RPM package, carry out the following command:

# rpm -e klnagent

To uninstall the Network Agent installed on a 64-bit operating system from an RPM package, carry out the following command:

# rpm -e klnagent64

To uninstall the Network Agent installed on a 32-bit operating system from a DEB package, carry out the following command:

# apt-get purge klnagent

To uninstall the Network Agent installed on a 64-bit operating system from a DEB package, carry out the following command:

# apt-get purge klnagent64

Page top

[Topic 206318]

Uninstalling the application using the Administration Console

You can uninstall Kaspersky Endpoint Security using Kaspersky Security Center Administration Console. To do this, create and run the uninstall application remotely task in Kaspersky Security Center.

If you want to remove only the graphical user interface without removing the application, specify the USE_GUI=No setting value in the autoinstall.ini configuration file and start the remote application installation task.

For more details about creating and running remote application installation and uninstall tasks, refer to the Kaspersky Security Center help file.

Page top

[Topic 202130]

Uninstalling the application using Kaspersky Security Center Web Console

You can uninstall the application remotely using the Kaspersky Security Center Web Console by means of the uninstall application remotely task. When performing the task, Kaspersky Endpoint Security downloads the application uninstallation utility to the user device. After completing the application uninstallation, the utility is automatically removed.

To uninstall the application:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. Click Add.

    The Task Wizard starts.

  3. Follow the Task wizard instructions.

Step 1. Configuring general task settings

At this step, configure the general settings of the task:

  1. In the Application drop-down list, select Kaspersky Security Center <version number>.
  2. In the Task type drop-down list, select Uninstall application remotely.
  3. In the Task name field, enter a brief description, for example, Uninstall Kaspersky Endpoint Security from Technical Support devices.
  4. In the Select devices to which the task will be assigned section, select the task scope.

Step 2. Selecting devices to uninstall the application

At this step, select the devices where to uninstall Kaspersky Endpoint Security according to the selected task scope.

Step 3. Configuring application uninstallation settings

At this step, configure the application uninstallation settings:

  1. Select Uninstall managed application.
  2. In the Application to be uninstalled drop-down list, select the Kaspersky Endpoint Security installation package.
  3. In the Force download of the uninstallation utility section, select the utility delivery method:
    • Using the Network Agent. If the Network Agent is not installed on the device, first the Network Agent is installed using the operating system tools. Then Kaspersky Endpoint Security is uninstalled by means of the Network Agent.
    • Using operating system resources through Administration Server. The utility is delivered to the client devices by means of the operating system tools using the Administration Server. You can select this option if the Network Agent is not installed on the client device, but the client device belongs to the same network as the Administration Server.
    • Using operating system resources through distribution points. The utility is delivered to the client devices using the operating system tools via the distribution points. You can select this option if there is at least one distribution point in the network. For more details about distribution points, refer to Kaspersky Security Center documentation.
  4. In the Maximum number of concurrent downloads field, set a limit on the number of requests sent to the Administration Server to download the application uninstallation utility. A limit on the number of requests will help prevent the network from being overload.
  5. In the Maximum number of uninstallation attempts field, set a limit on the number of attempts to uninstall the application. If the application uninstallation finishes with an error, the task automatically starts the uninstallation again.
  6. If necessary, clear the Verify operating system type before downloading check box. It allows you to avoid downloading the uninstallation utility if the operating system of the client device does not meet the software requirements. If you are sure that the device operating system meets the software requirements, you can skip the verification.

Step 4. Selecting the application action when the operating system restart is required

At this step, you can select the action to be performed by the application if uninstallation requires the operating system restart.

Step 5. Selecting an account for accessing the client devices

At this step, select the account used for uninstalling the application using the tools of the operating system. In this case, administrator rights are required for accessing the client device. You can add multiple accounts. If an account does not have sufficient rights, the Installation Wizard uses the next account. If you uninstall Kaspersky Endpoint Security by means of the Network Agent, you do not have to select an account.

Step 6. Completing task creation

Complete the wizard. A new task will be displayed in the list of tasks.

To run a task, select the check box next to the task and click the Start button. The application will be uninstalled in silent mode. After the application uninstallation finishes, you will be prompted to restart the client device.

Page top

[Topic 197923]

About the End User License Agreement

The End User License Agreement is a binding agreement between you and AO Kaspersky Lab, stipulating the terms on which you may use the application.

Read through the terms of the License Agreement carefully before you start using the application.

You can view the terms of the License Agreement:

By confirming that you accept the End User License Agreement during post-installation configuration of the application, you accept the terms and conditions of the End User License Agreement. If you do not accept the terms of the End User License Agreement, do not use the application.

Page top

[Topic 69240]

About the license

A license is a time-limited right to use Kaspersky Endpoint Security, granted under the End User License Agreement.

The list of available functions and the validity period of the application depend on the license under which the application is used.

The following license types are provided:

  • Trial – a free license intended for trying out the application.

    Trial licenses have a short validity period. When the trial license expires, all Kaspersky Endpoint Security features become disabled. To continue using the application, you need to purchase a commercial license.

    You can use the application under a trial license for only one trial period.

  • Commercial is a paid license.

    The main functions of the application stop working when a commercial license expires. To continue using Kaspersky Endpoint Security, you need to renew the commercial license. After the license expires, you can no longer use the application and must uninstall it from the device.

    It is recommended to renew the license before its expiration date to ensure continued protection of your device against security threats.

Page top

[Topic 73976]

About the license certificate

The License Certificate is a document provided together with the key file or activation code.

A license certificate contains the following information about the license provided:

  • License key or order number
  • Information about the license user
  • Information about the application that can be activated under the provided license
  • Restrictions on the number of licensing units (for example, devices on which the application can be used under the license)
  • License validity start date
  • License expiration date or validity period
  • License type
Page top

[Topic 209867]

About the license key

The license key is a sequence of bits that can be used to activate the application for further usage in accordance with the terms of the End User License Agreement. License key is generated by Kaspersky experts.

You can add a license key to the application using one of the following methods: by applying a key file or by entering an activation code. After you add a key to the application, the license key is displayed in the application interface as a unique alphanumeric sequence.

The license key may be blocked by Kaspersky, if the terms of the End User License Agreement are violated. If the license key is blocked, add another license key for proper application operation.

A license key may be active or reserve.

Active license key is currently used to run the application. A license key for a trial or commercial license can be added as the active key. The application cannot have more than one active license key.

Reserve license key is a license key that entitles the user to use the application, but is not currently in use. The reserve license key automatically becomes active when the license associated with the current active license key expires. A reserve license key can be added only if an active license key is already added.

A trial license key can only be added as an active license key. A trial license key cannot be added as a reserve license key.

Page top

[Topic 69430]

About the activation code

An activation code is a unique sequence of twenty Latin letters and numbers. You have to enter an activation code in order to add a license key for activating Kaspersky Endpoint Security. You receive the activation code at the email address that you provided when you bought Kaspersky Endpoint Security or requested the trial version of Kaspersky Endpoint Security.

To activate the application with an activation code, you need Internet access in order to connect to Kaspersky activation servers.

If you lost your activation code after activating the application, contact the Kaspersky partner from whom you purchased the license.

Page top

[Topic 69431]

About the key file

A key file is a file with the .key extension that you receive from Kaspersky. Key files are intended to add a license key for activating the application.

You receive a key file at the email address that you provided when you bought Kaspersky Endpoint Security or ordered the trial version of Kaspersky Endpoint Security.

You do not need to connect to Kaspersky activation servers in order to activate the application with a key file.

You can restore a key file if it has been accidentally deleted. You may need a key file to register a Kaspersky CompanyAccount, for example.

To restore your key file, perform any of the following actions:

  • Contact the license seller.
  • Get the key file on the Kaspersky website when you have an activation code.
Page top

[Topic 201930]

About subscription

Subscription for Kaspersky Endpoint Security is a purchase order for the application with specific settings (subscription expiry date, number of devices protected). You can order a subscription for Kaspersky Endpoint Security from your service provider (such as your internet service provider). You can renew or cancel your subscription. You can manage your subscription on the website of the service provider.

Subscription can be limited (for one year, for example) or unlimited (without an expiry date). To continue using the application after the limited subscription expires, you need to renew your subscription. Unlimited subscription is renewed automatically if the vendor's services have been prepaid on time.

Upon a limited subscription's expiry, you may be offered a grace period to renew the subscription. During this period the application retains its functionality. The service provider decides whether or not to grant a grace period and, if so, determines the duration of the grace period.

The set of options for managing your subscription may vary depending on your service provider. The service provider might not provide a grace period for renewing the subscription where the application retains its functionality.

To use Kaspersky Endpoint Security under a subscription, you need to use the activation code received from the service provider. After you apply the activation code, an active key corresponding to the license to use the application under subscription is added to the application. A reserve key can only be added when you use an activation code and cannot be added for a key file or subscription.

Activation codes purchased under subscription may not be used to activate previous versions of Kaspersky Endpoint Security.

Page top

[Topic 256558]

Comparison of application features across different licenses

The set of application functions available in Kaspersky Endpoint Security depends on the license (see the table below).

Application feature comparison is based on solutions based on Intel architecture processors. For information on licenses and available functionality for solutions based on Arm architecture, please contact your service provider in your region.

Comparison of application functions

 

Feature

Kaspersky Endpoint Security for Business Select

Kaspersky Endpoint Security for Business Advanced

Kaspersky Endpoint Security for Business Total

Kaspersky Hybrid Cloud Security (Desktop)

Kaspersky Security for Virtualization (Desktop)

Kaspersky Hybrid Cloud Security (Desktop, Enterprise)

Kaspersky Security for Virtualization (Core, Server)

Kaspersky Hybrid Cloud Security (Core, CPU, Server)

Kaspersky Hybrid Cloud Security (CPU, Server)

File Threat Protection

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Web Threat Protection

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Network Threat Protection

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Firewall Management

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Behavior Detection

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Device Control

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Removable Drives Scan

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Anti-Cryptor (for shared folders)

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Container Scan

Enabled.

Enabled.

System Integrity Monitoring

Enabled.

Enabled.

Application Control

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Enabled.

Page top

[Topic 250618]

Data provision

This section describes the information that Kaspersky Endpoint Security may store on the device and automatically send to Kaspersky during its operation.

Kaspersky protects any information thus received in accordance with law and the applicable rules of Kaspersky. Data is transmitted over encrypted channels.

For more detailed information about the processing, storage, and destruction of information obtained during the use of the application and transmitted to Kaspersky, please read the End User License Agreement, the KSN Statement, and refer to the Privacy Policy on the Kaspersky website. The license.<language ID> and ksn_license.<language ID> files containing the End User License Agreement and Kaspersky Security Network Statement are included in the application distribution package.

In this Help section

Data provided when using an activation code

Data provided when downloading updates from Kaspersky update servers

Data transferred when using the application in Light Agent mode

Data sent to Kaspersky Security Center

Data provided when following links in the application interface

Data provided when using Kaspersky Security Network

Data provided when using Kaspersky Anti Targeted Attack Platform

Page top

[Topic 250619]

Data provided when using an activation code

If Kaspersky Endpoint Security is used in standalone mode and is activated using an activation code, in order to verify if the application is being used legally and to obtain statistical information on the distribution and use of the application, you agree to provide the following information automatically:

  • ID of a regional activation center
  • List of agreements presented to the user by the application
  • Data compression type
  • Operating system family
  • Checksum type for the object being processed
  • Type of the license used to activate the application
  • Application ID derived from the license
  • Full version of the application
  • Unique device ID
  • Application ID
  • Application license expiration date and time
  • Application license ID
  • Application license key creation date and time
  • Current status of the application license key
  • Application license header
  • ID of the information model used to provide the application license
  • Set of IDs of the applications that can be activated on the user device
  • Type of application license used
  • Application locale
  • Application installation ID (PCID)
  • Application rebranding ID
  • Size of the content of the request to Kaspersky infrastructure
  • Format of the data in the request to Kaspersky infrastructure
  • Type of legal agreement accepted by the user while using the application
  • Version of the legal agreement accepted by the user while using the application
  • Protocol ID
  • Accessed IPv4 address of the web service

Page top

[Topic 250625]

Data provided when downloading updates from Kaspersky update servers

If Kaspersky Endpoint Security is used in standalone mode and you use Kaspersky update servers to download updates, in order to increase efficiency of the update procedure and to obtain statistical information on the distribution and use of the application, you agree to automatically provide the following information:

  • Application ID derived from the license
  • Full version of the application
  • Application license ID
  • Type of application license used
  • Application installation ID (PCID)
  • ID of the application update start
  • Web address being processed
Page top

[Topic 266696]

Data transferred when using the application in Light Agent mode

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments as part of Kaspersky Security for Virtualization Light Agent, the application saves the following information, which may contain personal and confidential data, and sends it to other solution components during operation of the application.

  • To carry out the activation process, Kaspersky Endpoint Security sends the following data to the Protection Server: OS type of the protected virtual machine, ticket validity period; ticket request time (in UTC format); identifier (BIOS ID) of the protected virtual machine.
  • To update the Light Agent databases, Kaspersky Endpoint Security sends the following data to the Protection Server: software identifier obtained from the license; full version of the software; software license identifier; software installation identifier (PCID); processed web address; type of the license; identifier of the update start.
  • To provide protection, Kaspersky Endpoint Security sends the Protection Server the information that is necessary for scanning objects while scan tasks are running. The transmitted information may include the names of files and paths to them in the file system, the checksums of files, web addresses, and the scanned objects or their fragments.
  • In an infrastructure managed by a VMware vCenter Server and VMware NSX Manager, Kaspersky Endpoint Security may send the Integration Server information about security tags that are assigned to a protected virtual machine upon detection of viruses, malware, or activity that is typical of network attacks. The IDs of protected virtual machines are also sent.
  • To get information that is used when selecting an SVM for connection, Kaspersky Endpoint Security sends the identifier of the protected virtual machine to the Integration Server and Protection Server.
  • When using the Kaspersky Security for Virtualization Light Agent solution in multitenancy mode, the information necessary for generating tenant protection reports may be sent to SVMs from the Kaspersky Endpoint Security Protection Server. The following data may be sent: identifier of the protected virtual machine; type and version of the guest operating system installed on the protected virtual machine; time intervals when Kaspersky Endpoint Security was connected to SVMs.
  • To obtain statistics, Kaspersky Endpoint Security sends the following information to the Protection Server: information about the OS version of the protected virtual machine; localization of Kaspersky Endpoint Security; names of active Kaspersky Endpoint Security components; identifier (BIOS ID) of the protected virtual machine.

The specified information is transmitted over encrypted data channels (except for the information necessary for scanning objects, and the information that is used when selecting SVMs). The connection between Kaspersky Endpoint Security and the Protection Servers is not encrypted by default. You can enable encryption of the data channel between the Light Agents and the Protection Servers in the Kaspersky Endpoint Security settings.

Page top

[Topic 250629]

Data sent to Kaspersky Security Center

During operation, Kaspersky Endpoint Security saves and submits to Kaspersky Security Center the following information, which may contain personal and confidential data:

  • Information about the databases used by the application:
    • List of the database categories required by the application
    • Date and time when the databases were released and loaded into the application
    • Date when the downloaded application database updates were released
    • Time of the last application database update
    • Number of records in the currently used application databases
  • Application license information:
    • License serial number and type
    • License validity period in days
    • Number of devices covered by the license
    • Start and end dates of license term
    • License key status
    • Date and time of the last successful synchronization with activation servers if the application was activated using an activation code
    • Identifier of the application for which the license is intended
    • Functionality available under the license
    • Name of the organization for which the license is provided
    • Additional information if the application is used under subscription (subscription flag, subscription expiration date and the number of days available for renewing the subscription, subscription provider web address, current subscription status and the reason for this status), date and time when the application was activated on the device
    • Expiration date and time of the application license on the device
  • Information about the application updates:
    • List of updates to be installed or removed
    • Update release date and the sign of the Critical status
    • Name, version, and short description of the update
    • Link to the detailed description of the update
    • Identifier and text of the End User License Agreement and the Privacy Policy for the application updates
    • Identifier and text of Kaspersky Security Network Statement for the application updates
    • Indicator showing if the update can be removed
    • Versions of the application policy and administration plug-in
    • Web address for downloading the application administration plug-in
    • Names, version, and installation dates of the installed application updates
    • Error code and description if the update installation or removal completed with an error
    • Sign and reason for the device or application restart necessity because of the application update
  • User agreement or disagreement with the terms and conditions of Kaspersky Security Network Statement, End User License Agreement and Privacy Policy
  • List of tags assigned to the device
  • List of device statuses and reasons they are assigned.
  • General application status and the status of all its components; policy compliance information, real-time protection status of the device.
  • Date and time of the last device scan; number of scanned objects; number of detected malicious objects; number of blocked, deleted and disinfected objects; number of objects that cannot be disinfected; number of scan errors; number of detected network attacks
  • Data on the currently applied values of the application settings
  • The current status and execution results of the group and local tasks and the values of their settings
  • Information about external devices connected to the client device (ID, name, class, manufacturer, description, serial number, VID/PID)
  • Information about backup copies of files in the Backup storage (name, path, size and type of the object, description of the object, name of the detected threat, version of the application database which is used to detect the threat, date and time when the object was moved to the Backup storage), actions on the objects in the Backup storage (removed, restored), and the files by administrator request.
  • Information about the operation of each application component and about the execution of each task represented as events:
    • Date and time of event
    • Name and type of event
    • Event severity level
    • Name of the task or the application component running when the event occurred
    • Information about the application that triggered the event: application name, path to the file on the disk, process identifier, setting values​ (if the application launch or settings modification event is triggered)
    • User ID
    • Name of the initiator (task scheduler, application, Kaspersky Security Center, or a user) whose actions triggered the event
    • Name and identifier of the user who initiated access to the file
    • Object or action processing result (description, type, name, threat level and accuracy, file name and type of operation on the device, application decision on the operation)
    • Information about the object (object name and type, path to the object on the disk, object version, size, information about the performed action, event trigger description, description of the reason for not processing and skipping the object)
    • Device information (manufacturer name, device name, path, device type, bus type, identifier, VID/PID, system device flag, name of the device access rule schedule)
    • Information about blocking and unblocking the device; information about blocked connections (name, description, device name, protocol, remote address and port, local address and port, packet rules, actions)
    • Information about requested web address
    • Information about detected objects
    • Detection type and method
    • Information about the performed action
    • Information about the application databases (date when the downloaded database updates are released, information on the database usage, database usage errors, information on canceling the installed database updates)
    • Information about encryption detection (ransomware name; name of the device where encryption was detected; information about blocking and unblocking the device)
    • Application settings and network settings
    • Information about the triggered Application Control rule (name and type) and the result of its application
    • Information about containers and container images (names of containers or container images, paths to containers or container images, repository URL)
    • Information about active and blocked connections (name, description, and type)
    • Information about blocking and unblocking access to untrusted devices
    • Information about the use of KSN (KSN connection status, KSN infrastructure, identifier of the KSN Statement in extended mode, acceptance of the KSN Statement in extended mode, identifier of the KSN Statement, acceptance of the KSN Statement)
    • Information about certificates (domain name, subject name, issuer name, expiration date, certificate status, certificate type, date certificate was added, issue date, serial number, SHA256 thumbprint)
    • Information about external systems that are part of corporate software solutions (integration server address)
    • Information about enabling and disabling network isolation for the device
    • Information about working in Light Agent mode: name of the virtual machine template, address of the Integration Server
    • name of the device for which network isolation is enabled or disabled
  • Information about operation of the system integrity scan task (name, type, path) and information about the system baseline
  • Information about network activity, packet rules, and network attacks
  • User role information:
    • Name and identifier of the user who initiated changing the user role
    • User role
    • Name of the user who has been assigned or revoked the role
  • Information about executable files detected on the client device (name, path, type, and hash of the file; list of categories to which the application belongs; trust group to which the application belongs; time of the first file launch; name and version of the application; name of the application vendor; information about the certificate used to sign the application: serial number, thumbprint, issuer, subject, release date, expiration date, and public key; HIPS group name, KSN group name).
Page top

[Topic 250630]

Data provided when following links in the application interface

When clicking the links in Kaspersky Endpoint Security interface, you agree to automatically provide the following information to Kaspersky:

  • Full version of the application
  • Application locale
  • Application ID (PID)
  • Link name

Page top

[Topic 250631]

Data provided when using Kaspersky Security Network

If you use Kaspersky Security Network in extended mode, you agree to automatically provide Kaspersky with all the data listed in the Kaspersky Security Network Statement. Additionally, files (or parts of files) that intruders may use to harm the device and the data stored in its operating system may be sent to Kaspersky for scanning.

The ksn_license.<language ID> file with the text of the Kaspersky Security Network Statement is included in the application distribution kit.

Page top

[Topic 250632]

Data provided when using Kaspersky Anti Targeted Attack Platform

When integrating Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA), a component of the Kaspersky Anti Targeted Attack Platform solution, Kaspersky Endpoint Security stores and send to Kaspersky Security Center the following information, which may contain personal and confidential data:

  • Service data:
    • KATA server addresses
    • Public key of the certificate of the server for integrating with Kaspersky Endpoint Detection and Response (KATA)
    • Cryptocontainer with the client certificate for integrating with Kaspersky Endpoint Detection and Response (KATA)
    • Credentials for authenticating on the proxy server
    • Settings for the frequency of synchronization with the KATA server and settings for sending data to the KATA server
    • Status of the connection with the KATA server and information about client certificate and server certificate errors

When integrating Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA), Kaspersky Endpoint Security stores the following information and may send it to the KATA server:

  • Information for synchronization requests to the EDR (KATA) component:
    • Unique identifier
    • Base part of the server address
    • Device name
    • IP address of the device
    • MAC address of the device
    • Local time on the device
    • Name and version of the operating system installed on the device
    • Version of Kaspersky Endpoint Security
    • Version of the application settings and task settings
    • Task status (task identifiers, statuses, error codes)
  • Information from requests to the EDR (KATA) component in task execution reports:
    • IP address of the device
    • Task execution errors and return codes
    • Task completion statuses
    • Task completion time
    • Versions of task settings used
    • Information about processes started or stopped on the device at the server's request: PID and UniquePID, error code, MD5 and SHA256 checksums of objects
    • Files requested by the server
    • Telemetry packets
    • Information about running processes:
      • executable file name, including the full path and extension
      • process launch settings
      • process identifier
      • system logon session code
      • system logon session name
      • process launch date and time
      • MD5 and SHA256 checksums of the object
    • Information about files:
      • File path
      • File name
      • File size
      • File attributes
      • Date and time of file creation
      • Date and time of last file modification
      • MD5 and SHA256 checksums of the object
    • Information about errors that occur while getting information about objects:
      • Full name of the object being processed when the error occurred
      • Error code
  • Information from requests from the KATA server to the built-in agent of Kaspersky Endpoint Security (task settings):
    • Task types
    • Task start schedule settings
    • Names and passwords of accounts used to start tasks
    • Versions of settings
    • Paths to objects
    • MD5 and SHA256 checksums of objects
    • Command line (including arguments) used to start the process
    • Description of services
    • Type of service start
  • Parameters of the responses sent by the KATA server to the built-in agent of Kaspersky Endpoint Security:
    • Get File task:
      • Full path to the file or directory
      • Hashing algorithm Possible values: MD5 and/or SHA256
      • Checksums (MD5 and SHA256) of the file
    • Delete File task:
      • confirmation of deletion, or an error that occurred.
    • Run Process task:
      • Full path to the executable file used to start the process
      • Command line of the process
      • Full path to the working directory of the process
    • Terminate Process task:
      • Unique PID of the process.
      • System PID of the process.
      • Process termination error code (0 if the process terminated successfully).
    • IOC Scan task:
      • Scan results (whether each indicator was detected, objects found, and information about which branch of the indicator was detected).

      For the objects in which indicators were detected, different values are returned depending on their type:

      • ArpEntry: IP address from the ARP table (including ipv6), physical address from the ARP table.
      • File: MD5 hash of the file, SHA256 hash of the file, full file name (including path), file size.
      • Port: remote IP address and port used to established a connection during scan; IP address and port of the local adapter; protocol type (TCP, UDP, IP, RAWIP).
      • Process: process name; process arguments; path to the process file; system PID of the process; system PID of the parent process; name of the user that the process is running as; date and time the process started.
      • SystemInfo: OS name; OS version; network name of a computer without a domain; domain or workgroup.
      • User: user name.
  • Network isolation: whether network isolation is enforced.
Page top

[Topic 197929]

Starting and stopping the application

By default, Kaspersky Endpoint Security starts automatically when the operating system is booted (at the default level of execution for each operating system). The application starts all service tasks as well as user tasks with starting mode set to PS in the schedule settings.

If you stop the application, all running tasks will be interrupted. After restarting the application, paused user tasks are not resumed automatically. Only user tasks with starting mode set to PS in the schedule settings are restarted.

To run the application, the root account must be the owner of the following directories and only the owner must have write access to them: /var, /var/opt, /var/opt/kaspersky, /var/log/kaspersky, /opt, /opt/kaspersky, /usr/bin, /usr/lib, /usr/lib64.

Starting, restarting, and stopping Kaspersky Endpoint Security

To start the application in systemd, execute the following command:

systemctl start kesl

To stop the application in systemd, execute the following command:

systemctl stop kesl

To restart the application in systemd, execute the following command:

systemctl restart kesl

To start the application in the system without systemd, execute the following command:

/etc/init.d/kesl start

To stop the application in the system without systemd, execute the following command:

/etc/init.d/kesl stop

To restart the application in the system without systemd, execute the following command:

/etc/init.d/kesl restart

Monitoring the status of Kaspersky Endpoint Security

The Kaspersky Endpoint Security status is monitored by the watchdog service. The watchdog service is automatically launched when the application starts.

In the event of an application crash, a dump file is generated and the application is restarted automatically.

To display the application status in systemd, execute the following command:

systemctl status kesl

To display the application status in the system without systemd, execute the following command:

/etc/init.d/kesl status

Page top

[Topic 245711]

Displaying Help on the commands

The kesl-control --help <set of application commands> command displays help for the application commands.

Command syntax

kesl-control --help [<set of application commands>]

<set of application commands>

Available values:

-T – Commands for managing tasks and general application settings.

-C – Commands for managing general container scan settings.

-N – Commands for managing encrypted connections scan settings.

-L – Commands for managing license keys and integration of Kaspersky Endpoint Security with Kaspersky Managed Detection and Response.

-E – Commands for managing application events.

-B – Commands for managing the Storage Management task.

-F – Commands for managing the Firewall Management task.

-H – Commands for managing the Anti-Cryptor task.

-D – Commands for managing the Device Control task.

-A – Commands for managing the Application Control task.

-U – Commands for managing users and user roles.

-SStatistical commands.

-WDisplay events.

-R – command to manage the settings of Kaspersky Endpoint Security integration with Kaspersky Endpoint Detection and Response (KATA).

-V – application commands in Light Agent mode to protect virtual environments.

Page top

[Topic 238601]

Enabling automatic addition of kesl-control commands (bash completion)

Automatic addition of kesl-control commands can be disabled for the bash shell.

To enable automatic addition of kesl-control commands in the current bash shell session, run the following command:

source /opt/kaspersky/kesl/shared/bash_completion.sh

To enable automatic addition for all new bash shell sessions, run the following command:

echo "source /opt/kaspersky/kesl/shared/bash_completion.sh" >> ~.bashrc

Page top

[Topic 197937]

Enabling the display of events

The kesl-control -W command enables display of the current application events. The command returns the name of the event and additional information about the event.

You can use this command either separately to display all current application events or together with the kesl-control --start-task command to display only events related to the running task.

You can also use the kesl-control -W command with the --query flag to specify filter conditions to display specific events.

Command syntax

kesl-control -W

Examples:

Enable the display of current application events:

kesl-control -W

Enable display of the current events of the task with ID=1:

kesl-control --start-task 1 -W

Enable display of the current events of the TaskStateChanged type:

kesl-control -W --query "EventType == 'TaskStateChanged'"

Page top

[Topic 246692]

Viewing information about the application

The kesl-control --app-info command displays information about the application.

Command syntax

kesl-control [-S] --app-info [--json]

Result of command execution:

  • Name. Application names.
  • Version. Current application version.
  • Policy. Indicates whether the Kaspersky Security Center policy is applied.
  • License information. License information or license key status.
  • Subscription status. Subscription status. This field is displayed if the application is started under a subscription.
  • License expiration date. Date and time when the license expires, in UTC.
  • MDR BLOB file status. Status of the BLOB configuration file for integration with Managed Detection and Response.
  • Kaspersky Managed Detection and Response license expiration date. Date and time when the Kaspersky Managed Detection and Response license expires, in UTC.
  • Storage state. Storage status.
  • Storage space usage. Storage size.
  • Last run date of the Scan_My_Computer task. Time of the last Malware Scan task.
  • Last release date of databases. Date and time the application databases were last released.
  • Application databases. Displays whether the application databases have been downloaded.
  • Using Kaspersky Security Network. Information about using Kaspersky Security Network: Extended KSN mode, Basic KSN mode or Disabled.
  • Kaspersky Security Network infrastructure. Information about the infrastructure solution used to work with Kaspersky reputation databases: Kaspersky Security Network or Kaspersky Private Security Network.
  • Managed Detection and Response state. Managed Detection and Response state: active, inactive.
  • File Threat Protection. Status of the File Threat Protection task.
  • Container monitoring. Displays information about container scan settings.
  • System Integrity Monitoring. Status of the System Integrity Monitoring task.
  • Firewall Management. Status of the Firewall Management task.
  • Anti-Cryptor. Status of the Anti-Cryptor task.
  • Web Threat Protection. Status of the Web Threat Protection task.
  • Device Control. Status of the Device Control task.
  • Removable Drives Scan. Status of the Removable Drives Scan task.
  • Network Threat Protection. Status of the Network Threat Protection task.
  • Behavior Detection. Status of the Behavior Detection task.
  • Application Control. Status of the Application Control task.
  • Integration with Endpoint Detection and Response (KATA). Status of Kaspersky Endpoint Detection and Response (KATA) Integration task.
  • Application update status. Displays application update actions and the actions to be performed by the user.
  • Unstable application operation. Information about application failure and dump file creation is displayed. This field is displayed if a failure occurred the last time the application was launched.

Page top

[Topic 245716]

Description of the application commands

Displaying Help on application commands

--help – displays Help on application commands.

Displaying application events

-W – enables the display of application events.

Statistics commands

-S is a prefix indicating that the command belongs to the statistics command group.

[-S] --app-info – displays information about the application.

[-S] --omsinfo --file <file name and path> – creates a JSON file for integration with Microsoft Operations Management Suite.

Commands for managing application tasks and settings

-T is a prefix indicating that the command belongs to the group of commands for managing application settings and tasks.

[-T] --get-app-settings --file <file name and path> – displays the general application settings.

[-T] --set-app-settings --file <file name and path> – sets the general application settings.

[-T] --set-app-settings <setting>=<setting value> – sets the value for the specified general application setting.

[-T] --export-settings --file <full path to the configuration file> – exports the application settings to the configuration file.

[-T] --import-settings --file <full path to the configuration file> – imports the application settings from the configuration file.

[-T] --update-application – updates the application.

[-T] --get-task-list – displays a list of existing application tasks.

[-T] --get-task-state <task ID>|<task name> – displays the status of the specified task.

[-T] --create-task <task name> --type <task type> --file <file name and path> – creates a task of the specified type and imports the settings from the specified configuration file into the task.

[-T] --delete-task <task ID>|<task name> – deletes the task.

[-T] --start-task <task ID>|<task name> [-W] [--progress] – starts the task.

[-T] --stop-task <task ID>|<task name> – stops the task.

[-T] --suspend-task <task ID>|<task name> – pauses the task. The Update task cannot be paused.

[-T] --resume-task <task ID>|<task name> – resumes the task. The Update task cannot be resumed.

[-T] --scan-file <path to file or directory> [--action <action>] – creates and runs a temporary Custom Scan task (Scan_File), which is assigned a new identifier. The [ScanScope.item_#] and [ExcludedFromScanScope.item_#] sections in the settings of this task are not inherited from the original task with ID=3. If the --action <action> option is not specified, the Recommended action is performed. After the scan is complete, the temporary task is automatically deleted.

[-T] --scan-container <container|image[:tag]> – creates a temporary Custom Container Scan task (Custom_Container_Scan). After the scan is complete, the temporary task is automatically deleted.

[-T] --get-settings <task ID>|<task name> --file <file name and directory> – displays the task settings.

[-T] --set-settings <task ID>|<task name> [<parameters>] [--file <file name and directory>] [--add-path <path>] [--del-path <path>] [--add-exclusion <exclusion>] [--del-exclusion <exclusion>] – sets the task settings.

[-T] --set-settings [<task ID>|<task name>] --set-to-default – restores the task settings to their default values.

[-T] --set-schedule <task ID>|<task name> --file <file name and path> – sets the task schedule settings or imports them into the task from the configuration file.

[-T] --get-schedule <task ID>|<task name> --file <file name and path> – displays the task schedule settings or saves them to the configuration file.

Commands for managing container scan settings

-C is a prefix indicating that the command belongs to the group of commands for managing container scan settings.

[-C] --get-container-settings --file <file name and path> – displays the general container scan settings.

[-C] --set-container-settings --file <file name and path> – sets the general container scan settings.

Commands for managing encrypted connections scan settings

-N is a prefix indicating that the command belongs to the group of commands for managing encrypted connections scan settings.

-N --query user – displays a list of encrypted connections scan exclusions added by the user.

-N --query auto – displays a list of encrypted connections scan exclusions added by the application.

-N --query kl – displays a list of encrypted connections scan exclusions received from Kaspersky databases.

-N --clear-web-auto-excluded – clears the list of domains that the application automatically excluded from encrypted connections scan.

[-N] {--get-net-settings} [--file <file name and path>] – saves encrypted connection scan settings to an INI file.

[-N] {--set-net-settings} [--file <file name and path>] – sets encrypted connection scan settings.

[-N] --add-certificate --file <path to certificate file> – adds a certificate to the trusted certificate list.

[-N] --remove-certificate <certificate subject> – removes a certificate from the trusted certificate list.

[-N] --list-certificates – displays the trusted certificate list.

Commands for managing users and roles

-U is a prefix indicating that the command belongs to the group of commands for managing users and roles.

[-U] --get-user-list – displays a list of users and roles.

[-U] --grant-role <role> <user> – grants a role to a specified user.

[-U] --revoke-role <role> <user> – revokes a role from a specified user.

Licensing commands

-L is a prefix indicating that the command belongs to the group of commands used to manage license keys.

[-L] --add-active-key <activation code>|<key file> – adds an active key.

[-L] --add-reserve-key <activation code>|<key file> – adds a reserve key.

[-L] --remove-active-key – removes the active key.

[-L] --remove-reserve-key – removes the reserve key.

-L --query – displays information about the license key.

[-L] --load-mdr-blob <path to the BLOB configuration file> – downloads the BLOB configuration file.

[-L] --remove-mdr-blob – removes the BLOB configuration file.

The commands for adding and deleting license keys can be performed only if the application is used in standalone mode. In Light Agent mode for protecting virtual environments, these commands fail.

Commands for managing the Firewall Management task

-F is a prefix indicating that the command belongs to the group of commands for managing the Firewall Management task.

[-F] --add-rule [--name <string>] [--action <action>] [--protocol <protocol>] [--direction <directory>] [--remote <remote>] [--local <local>] [--at <index>] – adds a new rule.

[-F] --del-rule [--name <string>] [--index <index>] – deletes a rule.

[-F] --move-rule [--name <string>] [--index <index>] [--at <index>] – changes the rule priority.

[-F] --add-zone [--zone <zone>] [--address <address>] – adds an IP address to the zone.

[-F] --del-zone [--zone <zone>] [--address <address>] [--index <index>] – deletes an IP address from the zone.

-F --query – displays information about the task.

Commands used to manage blocked devices

-H is a prefix indicating that the command belongs to the group of commands for managing devices blocked by Anti-Cryptor and Network Threat Protection.

[-H] --get-blocked-hosts – displays a list of blocked devices.

[-H] --allow-hosts – unblocks blocked devices.

Commands for managing Device Control tasks

-D is a prefix indicating that the command belongs to the Device Control group of commands.

[-D] --get-device-list – displays a list of devices connected to the computer.

Commands for managing the Application Control task

-A is a prefix indicating that the command belongs to the Application Control group of commands.

[-A] --get-app-list – displays the list of applications detected on the computer while executing the Inventory Scan task.

[-A] --get-categories – displays a list of created Application Control categories.

Commands for managing the Storage

-B is a prefix indicating that the command belongs to the group of commands used to manage the Storage.

[-B] --mass-remove --query – clears the Storage completely or selectively.

-B --query <filter> -n <count> [--json] - displays information about the objects in the Storage that match the filter conditions in JSON format, where:

<number> – number of the latest objects of the selection (number of records from the end of the selection) to be displayed.

<filter> – filter conditions to limit the query results.

[-B] --restore <object ID> --file <file name and path> – restores an object from Storage.

Commands used to manage the event log

-E is a prefix indicating that the command belongs to the group of commands used to manage the event log.

-E --query <filter> --db <database file> -n <number> --file <file name and path> [--json] – outputs information about events that match filter conditions from the event log database to the specified file in JSON format, where:

<number> – number of the latest events of the selection (number of records from the end of the selection) to be displayed.

<filter> – filter conditions to limit the query results.

<file name and path> – name and path of the file where you want to save the events.

<database file> – name and path to the event log database file.

Commands for managing settings for Kaspersky Endpoint Detection and Response (KATA) Integration

-R – the prefix indicating that the command belongs to the group of commands to manage Kaspersky Endpoint Detection and Response (KATA) Integration.

[-R] --add-kataedr-server-certificate <file name and path> — Adds or replaces a previously added KATA server certificate.

[-R] --remove-kataedr-server-certificate — removes the KATA server certificate.

[-R] --query-kataedr-server-certificate — displays information about the KATA server certificate.

[-R] --add-kataedr-client-certificate <file name and path> — Adds or replaces a previously added client certificate used to secure the connection to the KATA server.

[-R] --remove-kataedr-client-certificate — removes the client certificate used to secure the connection to the KATA server.

[-R] --query-kataedr-client-certificate — displays information about the client certificate.

[-R] --isolation-stat – displays the current state of network isolation in the console: enabled or disabled.

[-R] --isolation-off – disable network isolation of the device (the command is executed synchronously, that is, control does not return until the task is completed). We recommend using this command if the connection to the KATA server is lost after network isolation is enabled.

Application commands in Light Agent mode for protecting virtual environments

The commands can be executed only if Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments.

-V – a prefix indicating that the command belongs to the group of commands of Kaspersky Endpoint Security used in Light Agent mode to protect virtual environments (as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent).

[-V] --ksvla-info – displays information about using the application in Light Agent mode to protect virtual environments:

  • Light Agent mode for protecting virtual environments: enabled / disabled.

    If Light Agent mode is enabled, the application is used as a Light Agent as part of Kaspersky Hybrid Cloud Security for Virtualization Light Agent. If Light Agent mode is disabled, the application is used in standalone mode.

  • VDI protection mode: enabled / disabled.

    VDI protection mode optimizes the operation of Kaspersky Endpoint Security on temporary virtual machines. If VDI protection mode is enabled, updates that require restarting the protected virtual machine are not installed on temporary virtual machines. When receiving updates that require a restart, the Light Agent installed on a temporary virtual machine sends a message to Kaspersky Security Center about the need to update the protected virtual machine template.

  • The role of the virtual machine in the virtual infrastructure: server or workstation.
  • The identifier (UUID) of the protected virtual machine.

[-V] --viis-info – displays information about the connection of Light Agent (the Kaspersky Endpoint Security application used as a Light Agent as part of the Kaspersky Hybrid Cloud Security for Virtualization Light Agent solution) to the Integration Server:

  • Address and port of the Integration Server that the Light Agent connects to.
  • Status of the connection to the Integration Server.
  • Date and time of the last connection between the Light Agent and the Integration Server.

[-V] --svm-info – displays information about the connection of Light Agent (the Kaspersky Endpoint Security application used as a Light Agent as part of the Kaspersky Hybrid Cloud Security for Virtualization Light Agent solution) to the SVM:

  • Address of the SVM to which the Light Agent is connected.
  • Method that the Light Agent uses to detect SVMs: using the Integration Server or using a list of manually defined SVM addresses.
  • List of SVM addresses, if the selected SVM discovery method is lists of SVM addresses.
  • Tag for connecting Light Agent to the SVM.
  • SVM selection algorithm: standard or advanced.
  • Type of SVM path in the virtual infrastructure, which is taken into account when selecting SVMs for connection if the extended SVM selection algorithm is applied.
  • Protection of the connection between the Light Agent and the Protection Server.

For information about the settings for connecting Light Agents to the Integration Server and SVMs, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

Page top

[Topic 201938]

Using filters to limit query results

You can use a filter to limit the query results for the following commands:

You can use multiple logical expressions to specify a filter by combining them using the AND operator. Logical expressions must be enclosed in quotation marks.

Syntax

"<field> <comparison operator> '<value>'"

"<field> <comparison operator> '<value>' and <field> <comparison operator> '<value>'"

Comparison operator

Comparison operator

Description

>

Greater than

<

Less than

like

Matches the specified value (when specifying the value, you can use masks %, see the example below)

==

Equal to

!=

Not equal to

>=

Greater than or equal to

<=

Less than or equal to

Examples:

Get information about files in the Storage that have the High severity level:

kesl-control -B --query "DangerLevel == 'High'"

Get information about events that contain the text "etc" in the FileName field:

kesl-control -E --query "FileName like '%etc%'"

Get events of the ThreatDetected type:

kesl-control -E --query "EventType == 'ThreatDetected'"

Output ThreatDetected events generated by ODS tasks:

kesl-control -E --query "EventType == 'ThreatDetected' and TaskType == 'ODS'"

Get events generated after the date specified in the UNIX time stamp system (the number of seconds that have elapsed since 00:00:00 (UTC), 1 January 1970):

kesl-control -E --query "Date > '1583425000'"

Get events generated after the date specified in YYYY-MM-DD hh:mm:ss format:

kesl-control -E --query "Date > '2022-12-22 18:52:45'"

Page top

[Topic 234826]

Exporting and importing application settings

Kaspersky Endpoint Security lets you export and import all application settings for troubleshooting, verifying settings, or simplifying the application's configuration on other user devices.

If the Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the settings of the Update task cannot be exported or imported.

When you export settings, all application and task settings are saved to a configuration file. This configuration file is used to import the application's configuration settings.

The application must be launched when settings are imported or exported. After the settings are imported, the application must be restarted.

When importing or exporting settings from an older application version, new settings are set to default values. Importing settings to an older application version is not supported.

Export settings

The kesl-control --export-settings command is for exporting settings.

Command syntax

kesl-control --export-settings --file <configuration file path> [--json]

Arguments and keys

--file <configuration file path> – full path to the configuration file where the application settings will be saved.

--json – format of the configuration file where the application settings will be saved. If a file format is not specified, the settings will be exported to an INI file.

Import settings

The kesl-control --import-settings command is for importing settings.

If the application is managed via Kaspersky Security Center, importing settings is not supported.

Command syntax

kesl-control --import-settings --file <configuration file path> [--json]

Arguments and keys

--file <configuration file path> – full path to the configuration file from which the application settings will be imported.

--json – format of the configuration file from which the application settings will be imported. If a file format is not specified, the application attempts to import settings from an INI file. If the import fails, an error is displayed.

When you import application settings, the UseKSN and CloudMode settings are set to No. To start or resume the use of Kaspersky Security Network, set the value of the UseKSN setting to Basic or Extended. To enable cloud mode, you must set the CloudMode setting to Yes. Cloud mode is available if use of KSN is enabled.

After application settings are imported, internal task IDs may change. It is recommended to use task names to manage them.

Page top

[Topic 197939]

Setting the application memory usage limit

You can specify the memory usage limit for Kaspersky Endpoint Security during scan tasks (ODS and OAS), in megabytes.

This setting limits only the amount of memory used when scanning files. That means that the total amount of memory required by the application can be more than the value of this setting.

The minimum value is 2 MB. Default value is 8192 MB. If the specified value is less than 2 MB, then the application uses the minimum value (2 MB). If the specified value is greater than the amount of RAM, then the application will use only 25% of the RAM. This value cannot be changed.

To specify a limit on memory use when scanning files:

  1. Stop Kaspersky Endpoint Security.
  2. Open the /var/opt/kaspersky/kesl/common/kesl.ini file for editing.
  3. Add the following setting to the [General] section:

    ScanMemoryLimit=<amount of memory in megabytes>

  4. Start Kaspersky Endpoint Security.

The new memory usage limit for scanning files will be in effect after the application starts.

Page top

[Topic 197942]

User roles

Access to Kaspersky Endpoint Security functions is provided to users in accordance with their roles. A role is a set of rights and privileges for managing the application.

Four groups of system users are created in the operating system: kesladmin, kesluser, keslaudit, and nokesl. When you assign an application role to a system user, the user is added to the corresponding group of roles (see the Roles table below). When you revoke a role from a user, this user is removed from the corresponding group of roles.

If no application role is assigned to a system user, that user belongs to a separate group of users without rights.

Thus, the roles correspond to the four groups of operating system users:

  • kesladmin – the Administrator role
  • kesluser – the User role
  • keslaudit – the Auditor role
  • nokesl is assigned to a user if no other roles are assigned. In this case, the user belongs to a separate group of users without privileges

The table below describes the application roles and their permissions.

User roles

Role name

Role in application

OS user

Permissions

Administrator

admin

kesladmin

Manage all application and task settings.

Manage application licensing.

Assigning roles to users.

Revoking user roles (the administrator has no right to revoke the admin role from himself).

View and manage users' Storages.

User

user

kesluser

Manage only Scan_File tasks.

Start and stop Update tasks.

View reports for the tasks created by this user.

View specific events that are common for all application users.

Auditor

audit

keslaudit

Viewing application settings

View application status.

View all tasks, their settings, and start schedules.

View all events.

View all objects in the Storage.

nokesl

No role is assigned in the application, no permissions.

In this section

Viewing a list of users and roles

Assigning a role to a user

Revoking a user role

Page top

[Topic 197944]

Viewing a list of users and roles

To view a list of users and their roles, execute the following command:

kesl-control [-U] --get-user-list

Page top

[Topic 197945]

Assigning a role to a user

To assign a role to a specific user, execute the following command:

kesl-control [-U] --grant-role <role> <user>

Example:

To assign the audit role to the user test15:

kesl-control --grant-role audit test15

Page top

[Topic 197946]

Revoking a user role

To revoke a role from a specific user, execute the following command:

kesl-control [-U] --revoke-role <role> <user>

Example:

To revoke the audit role from the user test15:

kesl-control --revoke-role audit test15

Page top

[Topic 201954]

General application settings

This section contains information about commands for managing general application settings and container scan settings.

In this section

Description of the general application settings

Editing general application settings

Description of general container scan settings

Editing general container scan settings

Page top

[Topic 247312]

Description of the general application settings

This section describes the values of the general settings of the Kaspersky Endpoint Security configuration file (see the table below).

General application settings

Setting

Description

Values

SambaConfigPath

Directory that stores the Samba configuration file. The Samba configuration file is required to ensure that the AllShared or Shared:SMB values can be used for the Path setting.

The standard directory of the SAMBA configuration file on the computer is specified by default.

Default value: /etc/samba/smb.conf.

The application must be restarted after this setting is changed.

NfsExportPath

The directory where the NFS configuration file is stored. The NFS configuration file is required to ensure that the AllShared or Shared:NFS values can be used for the Path setting.

The standard directory of the NFS configuration file on the computer is specified by default.

Default value: /etc/exports.

The application must be restarted after this setting is changed.

TraceLevel

Enables trace file generation and specifies the level of detail of the trace file.

Detailed – Generate a detailed trace file.

MediumDetailed – Generate a trace file that contains informational messages and error messages.

NotDetailed – Generate a trace file that contains error messages.

None (default value) — Do not generate a trace file.

TraceFolder

The directory that stores the application's trace files. Trace files contain information about the operating system, and may also contain personal data.

 

Default value: /var/log/kaspersky/kesl.

If you specify a different directory, make sure that the account under which Kaspersky Endpoint Security is running has read/write permissions for this directory. Root privileges are required to access the default trace files directory.

The application must be restarted after this setting is changed.

TraceMaxFileCount

Maximum number of application trace files.

 

1–10000

Default value: 10.

The application must be restarted after this setting is changed.

TraceMaxFileSize

Specifies the maximum size of an application trace file (in megabytes).

1–1000

Default value: 500.

The application must be restarted after this setting is changed.

BlockFilesGreaterMaxFileNamePath

Blocks access to files for which the full path length exceeds the defined settings value specified in bytes. If the length of the full path to the scanned file exceeds the value of this setting, scan tasks skip this file during scanning.

This setting is not available for operating systems that use the fanotify technology.

4096–33554432

Default value: 16384.

After changing the value of this setting, the File Threat Protection task needs to be restarted.

DetectOtherObjects

Enables detection of legitimate software that could be used by intruders to harm computers or user data.

Yes— Enable detection of legitimate software that could be used by intruders to harm computers or user data.

No (default value) — Disable detection of legitimate software that could be used by intruders to harm computers or user data.

NamespaceMonitoring

Enable scanning of namespaces and containers.

The application does not scan namespaces and containers unless components for working with containers and namespaces are installed in the operating system. Moreover, when viewing application information in the Container Monitoring row, "The task is available and not running" is displayed.

Yes (default value) — Enable scanning of namespaces and containers.

No — Disable scanning of namespaces and containers.

InterceptorProtectionMode

File interceptor mode when executing tasks that use the file operation interceptor (File Threat Protection, Anti-Cryptor, Device Control, Removable Drives Scan). This setting affects the operating mode of File Threat Protection, Device Control, and Removable Drive Scan tasks.

Block (default value) – block the files while they are being scanned by the task that uses the file interceptor. A request to any file has to wait for scan results. When detecting infected objects, the application performs the actions specified in the FirstAction and SecondAction settings of the File Threat Protection task.

Notify — do not block the files while they are being scanned by the task that uses the file interceptor. Requests to any file is allowed, scanning is done asynchronously. When detecting infected objects, the application only records the event in the event log. The actions specified in the FirstAction and SecondAction settings of the File Threat Protection task are skipped.

If the Notify value is selected, the "Notify only" mode is enabled for the File Threat Protection and Device Control components.

If the Notify value is selected, the protection level of your device is reduced.

UseKSN

Enabling Kaspersky Security Network usage:

Basic - enable use of Kaspersky Security Network in standard mode.

Extended - enable use of Kaspersky Security Network in extended mode.

No (default value) — disable use of Kaspersky Security Network.

CloudMode

Enable cloud mode. Cloud mode is available if use of KSN is enabled.

If you plan to use cloud mode, make sure KSN is available on your device.

This setting applies only if the application is used in standalone mode.

Yes — enable the operating mode in which Kaspersky Endpoint Security uses a lightweight version of the malware databases.

No (default value) – use the full version of the malware databases.

Cloud mode is disabled automatically if use of KSN is disabled.

UseMDR

Enables Managed Detection and Response.

Yes – enable Managed Detection and Response.

No (default value) – disable Managed Detection and Response.

UseProxy

Enables use of a proxy server by Kaspersky Endpoint Security components. A proxy server can be used to communicate with Kaspersky Security Network and Kaspersky Endpoint Detection and Response (KATA) to activate the application, and when updating application databases and modules.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of a proxy server for connecting to Kaspersky Security Network, the SVM, and the Integration Server is not supported.

Yes - enable the use of a proxy server.

No (default) - Disable the use of a proxy server.

If Yes is selected, integration with Kaspersky Endpoint Detection and Response (KATA) happens through a proxy server.

ProxyServer

Proxy server settings in the format [user[:password]@]host[:port].

When connecting via an HTTP proxy, we recommend to use a separate account that is not used to sign in to other systems. An HTTP proxy uses an insecure connection, and the account may be compromised.

MaxEventsNumber

The maximum number of events stored by the application. When the specified number of events is exceeded, the application deletes the oldest events.

Default value: 500000.

If 0 is specified, events are not saved.

LimitNumberOfScanFileTasks

The maximum number of Scan_File tasks that a non-privileged user can simultaneously start on a device. This setting does not limit the number of tasks that a user with root privileges can start.

0–4294967295

Default value: 0.

If 0 is specified, a non-privileged user cannot start Scan_File tasks.

If you installed the graphical user interface package when installing the application, the LimitNumberOfScanFileTasks settings has the default value 5.

UseSyslog

Enable logging of information about events to syslog

Root privileges are required to access syslog.

Yes — Enable logging of information about events to syslog.

No (default value) — Disable logging of information about events to syslog.

EventsStoragePath

The database directory where the application saves information about events.

Root privileges are required to access the default event database.

Default value: /var/opt/kaspersky/kesl/private/storage/events.db.

ExcludedMountPoint.item_#

The mount point to be excluded from the scan scope for tasks that use a file operation interceptor (File Threat Protection and Anti-Cryptor). You can specify several mount points to be excluded from scans.

Mount points must be specified in the same way as they are displayed in the mount command output.

The ExcludedMountPoint.item_# setting is left unspecified by default.

AllRemoteMounted — Exclude all remote directories mounted on the device using SMB and NFS protocols from file operation interception.

Mounted:NFS — Exclude all remote directories mounted on the device using the NFS protocol from file operation interception.

Mounted:SMB — Exclude all remote directories mounted on the device using the SMB protocol from file operation interception.

Mounted:<file system type> — Exclude all mounted directories with the specified file system type from file operation interception.

/mnt — Exclude objects in the /mnt mount point (including subdirectories) from file operation interception. This directory is used as the temporary mount point for removable drives.

<path that contains the /mnt/user* or /mnt/**/user_share> — Exclude objects in mount points whose names contain the specified mask from file operation interception.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

MemScanExcludedProgramPath.item_#

Exclude process memory from scans.

The application does not scan the memory of the indicated process.

<full path to process> – Do not scan the process in the indicated local directory. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

UseOnDemandCPULimit

Enables limits on CPU utilization for ODS, ContainerScan, and InventoryScan tasks.

Yes – enable limits on CPU utilization for ODS, ContainerScan, and InventoryScan tasks.

No (default value) – disable limits on CPU utilization for ODS, ContainerScan, and InventoryScan tasks.

OnDemandCPULimit

The maximum load on all processor cores (as a percentage) when running ODS, ContainerScan, and InventoryScan tasks.

10–100

Default value: 100.

Page top

[Topic 234832]

Editing general application settings

Root privileges are required to change application settings.

To edit the general application settings:

  1. Save the general application settings to the configuration file using the --get-app-settings command:

    kesl-control [-T] --get-app-settings --file <configuration file path>

  2. Open the created configuration file, edit the necessary settings, and save the changes.
  3. Import the settings from the configuration file into the application using the --set-app-settings command:

    kesl-control [-T] --set-app-settings --file <configuration file path>

    To enable the Kaspersky Security Network usage, run the kesl-control --set-settings command with the --accept-ksn flag: kesl-control --set-app-settings UseKSN=Basic|Extended --accept-ksn.

Kaspersky Endpoint Security applies the new values of the settings after restart.

You can use the created configuration file to import the settings into the application installed on another device.

The kesl-control --get-app-settings command

The kesl-control --get-app-settings command displays the general application settings. You can also use this command to export the general application settings to a configuration file.

Command syntax

kesl-control [-T] --get-app-settings [--file <configuration file path>] [--json]

Arguments and keys

--file <configuration file path> – path to the configuration file where the application settings will be saved. If you specify the name of a file without specifying its path, the file will be created in the current directory. If a file with the specified name already exists in the specified path, it will be overwritten. If the specified directory cannot be found on the disk, the configuration file will not be created. If you do not specify the --file option, the general application settings will be displayed on the console.

--json – format of the configuration file where the application settings will be saved. If a file format is not specified, the settings will be exported to an INI file.

Example:

Export the general application settings to a file named kesl_config.ini. Save the created file in the current directory:

kesl-control --get-app-settings --file kesl_config.ini

The kesl-control --set-app-settings command

The kesl-control --set-app-settings command sets the general application settings using the command options or imports the general application settings from the specified configuration file.

Command syntax

kesl-control [-T] --set-app-settings <setting name>=<setting value> <setting name>=<setting value>

kesl-control [-T] --set-app-settings --file <configuration file path> [--json]

Arguments and keys

--file <configuration file path> – full path to the configuration file to import the settings into the application.

--json – format of the configuration file to import the settings into the application. If a file format is not specified, the application attempts to import settings from an INI file. If the import fails, an error is displayed.

Examples:

Import general settings into the application from the configuration file /home/test/kesl_config.ini:

kesl-control --set-app-settings --file /home/test/kesl_config.ini

Set the detail level for the trace file to low:

kesl-control --set-app-settings TraceLevel=NotDetailed

Add a mount point to be excluded from scan scope by tasks that use a file operation interceptor (File Threat Protection and Anti-Cryptor):

kesl-control --set-app-settings ExcludedMountPoint.item_0000="/data"

Page top

[Topic 234889]

Description of general container scan settings

This section describes the values of the general container and namespace scan settings (see the table below). Integration with Docker container management system, CRI-O framework, and Podman and runc utilities is supported.

The application does not scan namespaces and containers unless components for working with containers and namespaces are installed in the operating system. Moreover, when viewing application information in the Container Monitoring row, "The task is available and not running" is displayed. Namespace and container scans can be enabled using the NamespaceMonitoring setting described in the general application settings.

General container and namespace scan settings

Setting

Description

Values

OnAccessContainerScanAction

Action to be performed on a container when an infected object is detected.

This setting is available when using the application under a license that supports this function.

File Threat Protection task settings are used when scanning objects inside a container. The action performed on a container when an infected object is detected also depends on the File Threat Protection task settings (see the table below).

StopContainerIfFailed (default value) — Stop the container if an infected object cannot be disinfected or deleted.

StopContainer — Stop the container when an infected object is detected.

Skip — Do not perform any action on containers when an infected object is detected.

UseDocker

Use the Docker environment.

Yes (default value) — Use the Docker environment.

No — Do not use the Docker environment.

DockerSocket

Docker socket path or URI (Universal Resource Identifier).

Default value: /var/run/docker.sock.

UseCrio

Use the CRI-O environment.

Yes (default value) — Use the CRI-O environment.

No — Do not use the CRI-O environment.

CrioConfigFilePath

Path to the CRI-O configuration file.

Default value: /etc/crio/crio.conf.

UsePodman

Use the Podman utility.

Yes (default value) — Use the Podman utility.

No — Do not use the Podman utility.

PodmanBinaryPath

Path to the Podman utility executable file.

Default value: /usr/bin/podman.

PodmanRootFolder

 

Path to the root directory of the container storage.

Default value: /var/lib/containers/storage.

UseRunc

Use the runc utility.

Yes (default value) — Use the runc utility.

No — Do not use the utility.

RuncBinaryPath

Path to the runc utility executable file.

Default value: /usr/bin/runc.

RuncRootFolder

 

Path to the root directory of the container state storage.

Default value: /run/runc.

Actions performed on a container when an infected object is detected may vary depending on the specified values of the FirstAction and SecondAction settings of the File Threat Protection task and on the value of the InterceptorProtectionMode setting, one of the general application settings (see the table below).

Relationship between actions performed on containers and the specified action performed on infected objects

Value of the FirstAction / SecondAction or the InterceptorProtectionMode setting

Action performed on the container when the StopContainerIfFailed action is selected

Disinfect

Stop the container if disinfection of an infected object fails.

Remove

Stop the container if an infected object removal fails.

Block or Notify

Do not perform any action on containers when an infected object is detected.

Page top

[Topic 207299]

Editing general container scan settings

Editing general container scan settings

Root privileges are required to change application settings.

To edit the general container scan settings:

  1. Save the general Container Scan settings to the configuration file using the --get-container-settings command:

    kesl-control [-C] --get-container-settings --file <configuration file name>

  2. Open the created configuration file, edit the necessary Container Scan settings and save the changes.
  3. Import the Container Scan settings from the configuration file into the application using the --set-container-settings command:

    kesl-control [-C] --set-container-settings --file <configuration file name>

Kaspersky Endpoint Security will apply the new values of the settings after you restart it.

The kesl-control --get-container-settings command

The kesl-control --get-container-settings command displays the general Container Scan settings. You can also use this command to export the general container scan setting to the configuration file.

Command syntax

kesl-control [-C] --get-container-settings [--file <configuration file name>]

Arguments and keys

--file <configuration file name> – name of the configuration file where the container scan settings are saved.

If you specify the name of a file without specifying its path, the file will be created in the current directory. If a file with the specified name already exists in the specified path, it will be overwritten. If the specified directory cannot be found on the disk, the configuration file will not be created.

The kesl-control --set-container-settings command

The kesl-control --set-container-settings command sets the general Container Scan settings using the command keys, or imports the general Container Scan settings from the specified configuration file.

Command syntax

kesl-control [-C] --set-container-settings --file <configuration file name>

kesl-control [-C] --set-container-settings <setting name>=<setting value> <setting name>=<setting value>

Arguments and keys

--file <configuration file name> – name of the configuration file, including the full path to the file; the container scan settings from this file will be imported into the application.

Page top

[Topic 245737]

Managing application tasks using the command line

You can manage the application operation using tasks locally on the device (using the command line or configuration files), as well as using Administration Console or Kaspersky Security Center Web Console.

There are two types of tasks for working with the application:

  • Predefined task — a task created during installation of the application. Predefined tasks cannot be created or deleted, but you can modify the settings of these tasks.

    If the application is used in Light Agent mode to protect virtual environments, the settings of the predefined Update task cannot be edited.

  • A user task that you can create or delete on your own. Depending on the application usage mode, you can create the following types of tasks:

Task ID is an identifier that the application assigns to the task at creation. IDs for user tasks are starting from 100. All tasks (including deleted tasks) have unique IDs. The application does not reuse the identifiers of the deleted tasks. The identifier of a new task is the next successive number to the identifier of the latest created task.

Task names are not case-sensitive.

The application's predefined tasks are listed in the table.

Application tasks

Task

Task name in the command line

Task ID

Task type

File Threat Protection

File_Threat_Protection

1

OAS

Malware Scan

Scan_My_Computer

2

ODS

Custom Scan

Scan_File

3

ODS

Critical Areas Scan

Critical_Areas_Scan

4

ODS

Update

Update

6

Update

Rollback

Rollback

7

Rollback

Licensing

License

9

License

Storage management

Backup

10

Backup

System Integrity Monitoring

System_Integrity_Monitoring

11

OAFIM

Firewall Management

Firewall_Management

12

Firewall

Anti-Cryptor

Anti_Cryptor

13

AntiCryptor

Web Threat Protection

Web_Threat_Protection

14

WTP

Device Control

Device_Control

15

DeviceControl

Removable Drives Scan

Removable_Drives_Scan

16

RDS

Network Threat Protection

Network_Threat_Protection

17

NTP

Container Scan

Container_Scan

18

ContainerScan

Custom Container Scan

Custom_Container_Scan

19

ContainerScan

Behavior Detection

Behavior_Detection

20

BehaviorDetection

Application Control

Application_Control

21

AppControl

Inventory

Inventory_Scan

22

InventoryScan

Kaspersky Endpoint Detection and Response (KATA) Integration

KATAEDR

24

KATAEDR

You can perform the following actions with tasks:

The set of available actions for a task depends on the type of task and the application usage mode.

In this section

View the list of tasks

Creating a new task

Editing task settings using a configuration file

Editing task settings using the command line

Resetting task settings to their default values

Starting and stopping a task

Viewing a task state

Scheduling a task

Managing scan scopes from the command line

Managing exclusion scopes from the command line

Deleting a task

Page top

[Topic 236014]

View the list of tasks

To view the list of application tasks, execute the following command:

kesl-control [-T] --get-task-list [--json]

where:

--json – output format for the list of application tasks. If a file format is not specified, the output will be an INI file.

The list of Kaspersky Endpoint Security tasks will be displayed.

The following information will be displayed for each task:

If Kaspersky Security Center policy prohibits users from viewing and editing tasks locally, information will only be displayed about the Scan_File, Backup, License, File_Threat_Protection, System_Integrity_Monitoring, and Anti_Cryptor tasks. Information about other tasks is not available.

Page top

[Topic 197949]

Creating a new task

If you are using the application in standalone mode, you can create the following types of tasks: ODS, Update, Rollback, ODFIM, ContainerScan, and InventoryScan. If the application is used in Light Agent mode to protect virtual environments, you can create the following types of tasks: ODS, ODFIM, ContainerScan, and InventoryScan.

You can create tasks with default settings or with settings specified in a configuration file.

To create a task with default settings, execute the following command:

kesl-control [-T] --create-task <task name> --type <task type>

where:

  • <task name> is the name you assign to the new task;
  • <task type> is the type of task.

A task of the specified type is created with default settings.

To create a task with the settings specified in the configuration file, execute the following command:

kesl-control [-T] --create-task <task name> --type <task type> --file <path to file> [--json]

where:

A task of the specified type is created with settings specified in a configuration file.

Page top

[Topic 197950]

Editing task settings using a configuration file

If the application is used in Light Agent mode to protect virtual environments, the settings of the Update task cannot be edited.

To edit task settings by changing a configuration file:

  1. Save task settings to the configuration file:

    kesl-control --get-settings <task ID>|<task name> --file <full path to the file> [--json]

  2. Open the created configuration file for editing.
  3. Edit the required settings in the configuration file.
  4. Save the changes in the configuration file.
  5. Import the settings from the configuration file into the task:

    kesl-control --set-settings < task ID>|<task name> --file <full path to the file> [--json]

Task settings will be updated.

If you change the allowlist, or prohibit launch of all applications or applications that affect the operation of Kaspersky Endpoint Security in the Application Control task settings, run the --set-settings command with the --accept flag.

Page top

[Topic 246838]

Editing task settings using command line

If the application is used in Light Agent mode to protect virtual environments, the settings of the Update task cannot be edited.

To edit task settings using the command line:

  1. Specify the required setting value:

    kesl-control --set-settings <task ID>|<task name> <setting=value> [<setting=value>]

    The application changes the specified setting.

    If you change the allowlist, or prohibit launch of all applications or applications that affect the operation of Kaspersky Endpoint Security in the Application Control task settings, run the --set-settings command with the --accept flag.

  2. Make sure the setting value is changed in the task configuration file:

    kesl-control --get-settings <task ID>|<task name>

If you add a new scan scope or exclusion scope not specifying all settings, a scope with default settings is added to the configuration file.

Example:

To specify a new scan scope, execute the following command:

kesl-control --set-settings 100 ScanScope.item_0001.UseScanArea=Yes ScanScope.item_0001.Path=/home

A new section describing the scan scope is added to the task configuration file with ID=100:

[ScanScope.item_0001]

AreaDesc=

UseScanArea=Yes

Path=/home

AreaMask.item_0000=*

Page top

[Topic 197952]

Resetting task settings to their default values

Kaspersky Endpoint Security allows you to reset task settings to default values from command line.

Restoring default settings is not available for the License and Rollback tasks.

To reset task settings to their default values from the command line:

  1. Execute the following command:

    kesl-control --set-settings <task ID>|<task name> --set-to-default

    The application changes the setting values to their defaults.

  2. Make sure the settings' values are changed in the task configuration file:

    kesl-control --get-settings <task ID>|<task name> --file <configuration file name>

    The task configuration file contains default values for all settings.

Page top

[Topic 197953]

Starting and stopping a task

By default, the following tasks are automatically started when the application starts: File Threat Protection, Device Control, and Behavior Detection. The remaining tasks are stopped (their status is Stopped).

You can start a task at any time.

The Backup and License tasks cannot be started or stopped.

To start a task, execute the following command:

kesl-control --start-task <task ID>|<task name>

To stop a task, execute the following command:

kesl-control --stop-task <task ID>|<task name>

Page top

[Topic 246851]

Viewing a task state

To view a task state, execute the following command:

kesl-control --get-task-state <task ID>|<task name>

where:

  • <task ID> is the task ID that the application assigned to the task when it was created.

The application tasks can have one of the following states:

  • Started—Task is running.
  • Starting—Task is being launched.
  • Stopped—Task has been stopped.
  • Stopping—Task is stopping.

The ODS, ODFIM, and InventoryScan tasks can also have one of the following states:

  • Pausing — Task is pausing.
  • Suspended — Task is suspended.
  • Resuming — Task is resuming.

The Backup and License tasks cannot be started, suspended, or stopped. They can have only the Started state.

Page top

[Topic 236381]

Scheduling a task

If the application is used in standalone mode, you can view and configure the schedule settings for the following types of tasks: ODS, Update, Rollback, ODFIM, ContainerScan and InventoryScan. If the application is used in Light Agent mode to protect virtual environments, you can view and configure the start schedule settings for the following types of tasks: ODS, ODFIM, ContainerScan, and InventoryScan.

Editing task schedule settings

To configure task schedule settings:

  1. Save task schedule settings to a configuration file by executing the following command:

    kesl-control --get-schedule <task ID>|<task name> --file <configuration file name> [--json]

  2. Open the configuration file for editing.
  3. Specify the schedule settings.
  4. Save the changes in the configuration file.
  5. Import the schedule settings from the configuration file to the task using the following command:

    kesl-control --set-schedule <task ID>|<task name> --file <configuration file name> [--json]

The application will apply the new values of the schedule settings immediately.

Task schedule settings

The application provides the following settings for configuring the task launch schedule:

RuleType=Once|Monthly|Weekly|Daily|Hourly|Minutely|Manual|PS|BR

where:

Manual – start the task manually.

PS – start the task after starting the application.

BR – start the task after the application databases have been updated.

StartTime=[<year>/<month>/<day of the month>] [hh]:[mm]:[ss]; [<day of the month>|<day of the week>]; [<start periodicity>] – task start time. The StartTime setting is required if RuleType=Once|Monthly|Weekly|Daily|Hourly|Minutely.

RandomInterval=<minutes> – a time interval from 0 to the specified value (in minutes), which will be added to the task start time to avoid starting tasks at the same time.

RunMissedStartRules – enables launch of the missed task after the application starts.

Examples:

To schedule the task to start every ten hours, specify the following settings:

RuleType=Hourly

RunMissedStartRules=No

StartTime=2021/May/30 23:05:00;10

RandomInterval=0

To schedule the task to start every ten minutes, specify the following settings:

RuleType=Minutely

RunMissedStartRules=No

StartTime=23:10:00;10

RandomInterval=0

To schedule the task to start on the 15th of every month, specify the following settings:

RuleType=Monthly

RunMissedStartRules=No

StartTime=23:25:00;15

RandomInterval=0

To schedule the task to start on every Tuesday, specify the following settings:

RuleType=Weekly

StartTime=18:01:30;Tue

RandomInterval=99

RunMissedStartRules=No

To schedule the task to start every 11 days, specify the following settings:

RuleType=Daily

RunMissedStartRules=No

StartTime=23:15:00;11

RandomInterval=0

The kesl-control --get-schedule command

The kesl-control --get-schedule command displays the task schedule settings or saves them to the specified configuration file.

Command syntax

kesl-control [-T] --get-schedule <task ID>|<task name> [--file <configuration file name>] [--json]

Arguments and keys

<task ID> is the task identification number in the application.

<task name> is a name of a task.

--file <configuration file name> is the name of the configuration file where the schedule settings will be saved. If you specify the name of a file without specifying its path, the file will be created in the current directory. If a file with the specified name already exists in the specified path, it will be overwritten. If the specified directory cannot be found on the disk, the configuration file will not be created.

Examples:

Save the update task settings to a file named update_schedule.ini and save the created file in the current directory:

kesl-control --get-schedule 6 --file update_schedule.ini

Display the Update task schedule:

kesl-control --get-schedule 6

The kesl-control --set-schedule command

The kesl-control --set-schedule command sets the task schedule settings using the command keys or imports the task schedule settings from the specified configuration file.

Command syntax

kesl-control --set-schedule <task ID>|<task name> --file <configuration file name> [--json]

kesl-control --set-schedule <task ID>|<task name> <setting name>=<setting value> <setting name>=<setting value>

Arguments and keys

<task ID> is the task identification number in the application.

<task name> is a name of a task.

--file <configuration file name> is the name of the configuration file; the schedule settings from this file will be imported into the task; includes the full path to the file.

Example:

Import the schedule settings from the configuration file named /home/test/on_demand_schedule.ini into the task with ID=2:

kesl-control --set-schedule 2 --file /home/test/on_demand_schedule.ini

Page top

[Topic 197954]

Managing scan scopes from the command line

You can add or delete a scan scope with a specified Path for OAS, ODS, OAFIM, ODFIM, and AntiCryptor tasks from the command line.

To add a new scan scope, execute the following command:

kesl-control --set-settings <task ID>|<task name> --add-path <path>

A new [ScanScope.item_#] section will be added to the configuration file. The application scans the objects in the directory specified by the Path setting.

If a [ScanScope.item_#] section already exists for the specified Path setting, a duplicate section will not be added to the configuration file. If the UseScanArea setting is set to No its value will change to Yes after this command is executed and the objects located in this directory will be scanned.

To delete a scan scope, execute the following command:

kesl-control --set-settings <task ID>|<task name> --del-path <path>

The [ScanScope.item_#] section that contains the specified path will be deleted from the task configuration file. The application will not scan the objects in the directory specified by the Path setting.

Page top

[Topic 197955]

Managing exclusion scopes from the command line

You can add or delete an exclusion scope with a specified Path for OAS, ODS, OAFIM, ODFIM, and AntiCryptor tasks from the command line.

To add a new exclusion scope, execute the following command:

kesl-control --set-settings <task ID>|<task name> --add-exclusion <path>

In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion for the path: /.snapshots/*/snapshot/.

A new [ExcludedFromScanScope.item_#] section will be added to the configuration file. The application will exclude objects in the directory specified by the Path setting from scans.

If an [ExcludedFromScanScope.item_#] section already exists for the specified Path setting, a duplicate section will not be added to the configuration file. If the UseScanArea setting is set to No its value will change to Yes after this command is executed and the objects located in this directory will be excluded from scans.

To delete an exclusion scope, execute the following command:

kesl-control --set-settings <task ID>|<task name> --del-exclusion <path>

The [ExcludedFromScanScope.item_#] section that contains the specified path is deleted from the task configuration file. The application will not exclude objects in the directory specified by the Path setting from scans.

Page top

[Topic 197960]

Deleting a task

You can only delete tasks that you have created. Predefined tasks cannot be deleted.

If the application is used in Light Agent mode to protect virtual environments, the Update task cannot be deleted.

To delete a task, execute the following command:

kesl-control --delete-task <task ID>|<task name>

Page top

[Topic 236580]

Encrypted connections scan

You can configure settings for scanning the encrypted connections used in the Web Threat Protection task.

You can also configure the list of trusted certificates, which is used when scanning encrypted connections.

In this section

Encrypted connections scan settings

Managing encrypted connections scan settings

Managing trusted certificates

Page top

[Topic 198037]

Encrypted connections scan settings

All available values and default values for each setting are described in the table below.

When the encrypted connection scan settings are changed, the application records a NetworkSettingsChanged event in the log file.

Encrypted connections scan settings

Setting

Description

Values

EncryptedConnectionsScan

Enables or disables encrypted traffic scan.

For the FTP protocol, encrypted connections scan is disabled by default.

Yes (default value) — Enable encrypted connection scans.

No — Disable encrypted connection scans. The application does not decrypt the encrypted traffic.

EncryptedConnectionsScanErrorAction

Specifies the action to perform when an encrypted connection scan error occurs on a website.

AddToAutoExclusions (default value) — Add the domain where an error occurred to the list of domains with scan errors. The application will not monitor encrypted network traffic when this domain is visited.

Disconnect — Block the network connection.

CertificateVerificationPolicy

Specifies the way Kaspersky Endpoint Security checks certificates.

If a certificate is self-signed, the application does not perform the additional verification.

FullCheck (default value) — The application uses the Internet to check and download the missing chains that are required to verify a certificate.

LocalCheck — The application does not use the Internet to verify a certificate.

UntrustedCertificateAction

Specifies the action to perform when an encrypted connection scan error occurs on a website.

Allow (default value) — Allow network connections established while visiting a domain with an untrusted certificate.

Block — Block network connections established while visiting a domain with an untrusted certificate.

ManageExclusions

Enables or disables the use of the encrypted connection scan exclusions.

Yes — Do not scan websites specified in the [Exclusions.item_#] section.

No (default value) — Scan all websites.

MonitorNetworkPorts

Specifies the way Kaspersky Endpoint Security monitors network ports.

Selected (default value) — Monitor only network ports specified in the [NetworkPorts.item_#] section (see below).

All — Monitor all network ports. Specifying this value may significantly increase an operating system load.

The [Exclusions.item_#] section contains domains excluded from scans. The application does not scan encrypted connections established when visiting specified domains.

DomainName

Specifies the domain name. You can use masks to specify the domain.

The default value is not defined.

The [NetworkPorts.item_#] section contains the network ports monitored by the application.

PortName

Network port description.

The default value is not defined.

Port

Network port numbers to be monitored by the application.

165535

The default value is not defined.

Page top

[Topic 198038]

Managing encrypted connections scan settings

You can manage encrypted connections scan settings from the command line.

To view the list of encrypted connection scan exclusions added by a user, execute the following command:

kesl-control -N --query user

To view the list of encrypted connection scan exclusions added by a user, execute the following command:

kesl-control -N --query auto

To view the list of encrypted connection scan exclusions received from the application databases, execute the following command:

kesl-control -N --query kl

To clear a list of domains that the application automatically excluded from scan, execute the following command:

kesl-control -N --clear-web-auto-excluded

To view encrypted connection scan settings, execute the following command:

kesl-control [-N] --get-net-settings [--file <file path and name>]

The output format is INI.

To set encrypted connection scan settings, execute the following command:

kesl-control [-N] --set-net-settings [--file <file path and name>]

Page top

[Topic 236555]

Managing trusted certificates

You can set the list of certificates that will be trusted by the application. The list of trusted certificates is used when scanning encrypted connections.

You can manage the trusted certificate list from the command line.

To add a certificate to the trusted certificate list, run the following command:

kesl-control [-N] --add-certificate <path to certificate>

where:

<path to certificate> is the path to the certificate file that you want to add (PEM or DER format).

To remove a certificate from the trusted certificate list, run the following command:

kesl-control [-N] --remove-certificate <certificate subject>

To view the list of trusted certificates, execute the following command:

kesl-control [-N] --list-certificates

The following information is displayed for each certificate:

  • certificate subject
  • serial number
  • certificate issuer
  • certificate start date
  • certificate expiration date
  • SHA-256 certificate thumbprint
Page top

[Topic 197961]

File Threat Protection task (File_Threat_Protection, ID:1)

File Threat Protection prevents infection of the device's file system. The File Threat Protection task is created automatically with default settings when you install Kaspersky Endpoint Security application on your device. By default, the File Threat Protection task starts automatically when the application starts. The task resides in the device's RAM and scans all opened, saved, and active files.

Administrator role privileges are required to start and stop the File Threat Protection task from the command line.

Upon detecting malware, Kaspersky Endpoint Security may remove the infected file and terminate the malware process started from this file.

While the File Threat Protection task is running, the application scans all namespaces and containers on all supported operating systems if the value of the NamespaceMonitoring setting in the general application settings is set to Yes. Additionally, for Astra Linux, a custom virus scan task (Scan_File) allows files from other namespaces to be scanned (as part of a mandatory scan). You can separately configure general scan settings for containers and namespaces.

The application does not scan namespaces and containers unless components for working with containers and namespaces are installed in the operating system. Moreover, when viewing application information in the Container monitoring row, "The task is available and not running" is displayed.

File Threat Protection user tasks cannot be created. You can modify the settings of the default File Threat Protection task.

If InterceptorProtectionMode is set to Notify in the general application settings, then when infected objects are detected, the application does not perform the actions specified in the FirstAction and SecondAction settings of the File Threat Protection task.

In this Help section

Special considerations for scanning symbolic links and hard links

File Threat Protection task settings

Specifying an exclusion scope

Optimizing network directory scanning

Page top

[Topic 197963]

Special considerations for scanning symbolic links and hard links

Kaspersky Endpoint Security lets you scan symbolic links and hard links to files.

Scanning symbolic links

The application scans symbolic links only if the file referenced by the symbolic link is within the protection scope of the File Threat Protection task.

If the file referenced by the symbolic link is not within the File Threat Protection task, the application does not scan this file. However, if the file contains malicious code, the security of the device is at risk.

Scanning hard links

When processing a file with more than one hard link, the application chooses an action depending on the specified action on objects:

  • If the Perform recommended action option is selected, the application automatically selects and performs an action on an object based on data about the danger level of the threat detected in the object and the possibility of disinfecting it.
  • If the Remove action is selected, the application removes the hard link being processed. The remaining hard links to this file will not be processed.
  • If the Disinfect action is selected, the application disinfects the source file. If disinfection fails, the application deletes the hard link and creates in its place a copy of the source file with the name of the deleted hard link.

When you restore a file with a hard link from the Storage, the application creates a copy of the source file with the name of the hard link that was moved to the Storage. Connections with the remaining hard links to the source file will not be restored.

Page top

[Topic 234812]

File Threat Protection task settings

The table describes all available values and default values of all the settings that you can specify for the File Threat Protection task.

File Threat Protection task settings

Setting

Description

Values

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes—Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No (default value) — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes — Scan self-extracting archives.

No (default value) — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

SkipPlainTextFiles

Temporary exclusion of files in text format from scans.

If the value of this setting is SkipPlainTextFiles=Yes, the application does not scan text files if they are reused by the same process for 10 minutes after the most recent scan. This setting makes it possible to optimize scans of application logs.

Yes – Do not scan text files if they are reused by the same process for 10 minutes after the most recent scan.

No (default value) – scan files in plain text format.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

TimeLimit

Maximum object scan duration (in seconds).

The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 60.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

Before performing the action specified by you on an object, Kaspersky Endpoint Security blocks access to the object by applications that attempt to access it.

 

If InterceptorProtectionMode is set to Notify in the general application settings, then when infected objects are detected, the application does not perform the action specified in the FirstAction setting.

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, Kaspersky Endpoint Security immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Block – The application blocks access to an infected object. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

If InterceptorProtectionMode is set to Notify in the general application settings, then when infected objects are detected, the application does not perform the action specified in the SecondAction setting.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Block or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified a second action, the application applies Block as the second action.

Default value: Block.

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeMasks.item_# setting from the scan.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from the scan.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask.

You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Enables exclusion of objects containing the threats specified by the ExcludeThreats setting from scans.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

ScanByAccessType

File Threat Protection task operation mode. The ScanByAccessType setting applies only to the File Threat Protection task.

SmartCheck (default value) — Scan a file on attempts to open it, and scan it again on attempts to close it if the file has been modified. If a process accesses an object multiple times in the course of its operation and modifies it, the application scans the object again only when the process closes it for the last time.

OpenAndModify — Scan a file on attempts to open it, and scan it again on attempts to close it if the file has been modified.

Open — Scan a file on attempts to open it for reading, execution, or modification.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan scope, which contains additional information about the scan scope.

The maximum length of the string specified using this setting is 4096 characters.

Default value: All objects.

Example:

AreaDesc="Scanning of email databases"

 

UseScanArea

Enables scans of the specified scope. To run the task, enable scans of at least one scope.

Yes (default value) — Scan the specified scope.

No — Do not scan the specified scope.

AreaMask.item_#

Scan scope limitation. With this scan scope, the application only scans files that are specified using masks in the shell format.

If this setting is not specified, the application scans all the objects in the scan scope. You can specify several values for this setting.

The default value is * (scan all objects).

Example:

AreaMask_item_<item number>=*doc

 

Path

Path to the directory with objects to be scanned.

 

<path to local directory> — Scan objects in the specified directory. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Shared:NFS — Scan the device file system resources that are accessible via the NFS protocol.

Shared:SMB – Scan the device file system resources that are accessible via the Samba protocol.

Mounted:NFS – Scan the remote directories mounted on a device using the NFS protocol.

Mounted:SMB – Scan the remote directories mounted on a device using the Samba protocol.

AllRemoteMounted – Scan all remote directories mounted on the device using the Samba and NFS protocols.

AllShared – Scan all the device file system resources that are accessible via the Samba and NFS protocols.

<file system type> — Scan all the resources of the specified device file system.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan exclusion scope, which contains additional information about the exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from scans.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limitation of scan exclusion scope. In the exclusion scope, the application excludes from scans only files that are specified using masks in the shell format.

If this setting is not specified, the application does not scan any of the objects within the exclusion scope. You can specify several values for this setting.

Default value: * (exclude all objects from scan)

Path

Path to the directory with objects to be excluded.

 

<path to local directory> — Exclude objects in the specified directory (including subdirectories) from scans. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Mounted:NFS– Exclude the remote directories mounted on a device using the NFS protocol from scan.

Mounted:SMB – Exclude the remote directories mounted on a device using the Samba protocol from scan.

AllRemoteMounted – Exclude all remote directories mounted on the device using the Samba and NFS protocols from scan.

<file system type> — Exclude all the resources of the specified device file system from scans.

The [ExcludedForProgram.item_#] section contains the following settings:

ProgramPath

Path to excluded process.

<full path to process> – Do not scan the process in the indicated local directory.

ApplyToDescendants

Exclude child processes of the excluded process specified by the ProgramPath setting from scans.

Yes – exclude the specified process and all its child processes from scans.

No (default value) – exclude only the specified process from scans, do not exclude its child processes from scans.

AreaDesc

Description of the process exclusion scope.

Default value: All objects.

UseExcludedForProgram

Excludes the specified scope from scans.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limitation of the process exclusion scope. In the process exclusion scope, the application excludes from scans only the files that are specified using masks in the shell format.

If this setting is not specified, the application excludes from scans all the objects within the process exclusion scope. You can specify several values for this setting.

Default value: * (exclude all objects from scan)

Path

Path to a directory with files that are modified by the process.

 

<path to local directory> — Exclude objects in the specified directory from scan. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Shared:NFS — Exclude device file system resources that are accessible via the NFS protocol from scans.

Shared:SMB — Exclude device file system resources that are accessible via the Samba protocol from scans.

Mounted:NFS– Exclude the remote directories mounted on a device using the NFS protocol from scan.

Mounted:SMB – Exclude the remote directories mounted on a device using the Samba protocol from scan.

AllRemoteMounted – Exclude all remote directories mounted on the device using the Samba and NFS protocols from scan.

AllShared – Exclude all device file system resources that are accessible using the Samba and NFS protocols from scan.

<file system type> — Exclude all the resources of the specified device file system from scans.

Page top

[Topic 197965]

Specifying an exclusion scope

You can specify an exclusion scope for the File Threat Protection task. Files in the exclusion scope are excluded from protection scopes.

To create an exclusion scope:

  1. Save the File Threat Protection task settings to a file using the following command:

    kesl-control --get-settings 1 --file <full path to configuration file>

  2. Add the [ExcludedFromScanScope.item_#] section to the created file. This section contains the following settings:
    • AreaDesc – a description of the exclusion scope, which contains additional information about the exclusion scope.
    • Path – the path to the files or directories to be excluded from the protection scope.
    • AreaMask.item_# – file name mask for the files to be excluded from the protection scope.

      Example:

      [ExcludedFromScanScope.item_0000]

      AreaDesc=

      UseScanArea=Yes

      Path=/tmp/notchecked

      AreaMask.item_0000=*

  3. Import settings from the configuration file to the File Threat Protection task by using the following command:

    kesl-control --set-settings 1 --file <full path to configuration file>

You can also manage exclusion scopes from the command line.

Page top

[Topic 235226]

Optimizing network directory scanning

To optimize the File Threat Protection task, you can exclude from scans any files being copied from network directories. Files are scanned only after the process of copying to a local directory is finished. To exclude files located in network directories from scans, configure scan exclusion for the utility used to copy files from network directories (for example, for the cp utility).

To configure exclusion of network directories from scans:

  1. Save the File Threat Protection task settings to a file using the following command:

    kesl-control --get-settings 1 --file <full path to configuration file>

  2. Add the [ExcludedForProgram.item_#] section to the created file. This section contains the following settings:
    • ProgramPath – path to the process to be excluded or to the directory with the processes to be excluded.
    • ApplyToDescendants parameter indicates whether the scan should exclude child processes of the excluded process specified by the ProgramPath parameter (possible values: Yes or No).
    • AreaDesc – a description of the process exclusion scope, which contains additional information about the exclusion scope.
    • UseExcludedForProgram parameter indicates whether the scan task should exclude the specified scope (possible values: Yes or No).
    • Path – path to the files or directory with files modified by the process.
    • AreaMask.item_# is the file name mask for the files to be excluded from the scan. You can also specify the full path to the file.

      Example:

      [ExcludedForProgram.item_0000]

      ProgramPath=/usr/bin/cp

      ApplyToDescendants=No

      AreaDesc=

      UseExcludedForProgram=Yes

      Path=AllRemoteMounted

      AreaMask.item_0000=*

  3. Import settings from the configuration file to the File Threat Protection task by using the following command:

    kesl-control --set-settings 1 --file <full path to configuration file>

The application does not scan the files in network directories, but the cp command itself (for the example given above) and local files are scanned.

Page top

[Topic 246880]

Malware Scan task (Scan_My_Computer, ID:2)

Malware scan is a one-time full or custom scan of files on the device by Kaspersky Endpoint Security. The application can carry out multiple malware scanning tasks at the same time. You can also create custom malware scan tasks.

By default, a pre-installed malware scan task is created in the application — full scan. During a full scan, the application scans all objects located on the device's local drives, as well as all mounted and shared objects that are accessed via Samba or NFS protocols with the recommended security settings.

Upon detecting malware, Kaspersky Endpoint Security may remove the infected file and terminate the malware process started from this file.

If during execution of the malware scan task the application was restarted by a control service or manually by the user, the task will be stopped. The application logs the OnDemandTaskInterrupted event.

The table describes all available values and the default values of all the settings that you can specify for the Malware Scan task.

Malware Scan task settings

Setting

Description

Values

ScanFiles

Enables file scan.

Yes (default value) — Scan files.

No — Do not scan files.

ScanBootSectors

Enables boot sector scans.

Yes (default value) — Scan boot sectors.

No — Do not scan boot sectors.

ScanComputerMemory

Enables process memory and kernel memory scans.

Yes (default value) — Scan process memory and kernel memory.

No — Do not scan process memory and kernel memory.

ScanStartupObjects

Enables startup object scans.

Yes (default value) — Scan startup objects.

No — Do not scan startup objects.

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes (default value) — Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes (default value) — Scan self-extracting archives.

No — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

TimeLimit

Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 0.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, Kaspersky Endpoint Security immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Skip — The application does not try to disinfect or delete infected objects. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Skip or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified the second action, the application applies Skip as the second action.

Default value: Skip.

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeMasks.item_# setting from the scan.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from the scan.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

Before specifying a value for this setting, make sure that the UseExcludeMasks setting is enabled.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Enables exclusion of objects containing the threats specified by the ExcludeThreats setting from scans.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

 

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

DeviceNameMasks.item_#

List of device names. The application will scan boot sectors of these devices.

The setting value cannot be empty. At least one device name mask must be specified to run this task.

AllObjects – scan boot sectors of all devices.

<device name mask> – Scan boot sectors of the devices whose names match the specified mask.

Default value: /** – any set of characters in the device name, including the / character.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan scope, which contains additional information about the scan scope. The maximum length of the string specified using this setting is 4096 characters.

Default value: All objects.

Example:

AreaDesc="Mail bases scan"

 

UseScanArea

Enables scans of the specified scope. To run the task, enable scans of at least one scope.

Yes (default value) — Scan the specified scope.

No — Do not scan the specified scope.

AreaMask.item_#

Scan scope limitation. Within the scan scope, the application scans only the files that are specified using the masks in the shell format.

If this setting is not specified, the application scans all the objects in the scan scope. You can specify several values for this setting.

The default value is * (scan all objects).

Example:

AreaMask.item_<item number>=*doc

 

Path

Path to the directory with objects to be scanned.

 

<path to local directory> — Scan objects in the specified directory.

Shared:NFS — Scan the device file system resources that are accessible via the NFS protocol.

Shared:SMB – Scan the device file system resources that are accessible via the Samba protocol.

Mounted:NFS – Scan the remote directories mounted on a device using the NFS protocol.

Mounted:SMB – Scan the remote directories mounted on a device using the Samba protocol.

AllRemoteMounted – Scan all remote directories mounted on the device using the Samba and NFS protocols.

AllShared – Scan all the device file system resources that are accessible via the Samba and NFS protocols.

<file system type> — Scan all the resources of the specified device file system.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan exclusion scope, which contains additional information about the exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from scans.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limitation of scan exclusion scope. In the exclusion scope, the application excludes only the files that are specified using masks in the shell format.

If this setting is not specified, the application excludes all the objects in the exclusion scope. You can specify several values for this setting.

Default value: * (exclude all objects)

Path

Path to the directory with objects to be excluded.

 

<path to local directory> — Exclude objects in the specified directory (including subdirectories) from scans. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion /.snapshots/*/snapshot/.

Mounted:NFS– Exclude the remote directories mounted on a device using the NFS protocol from scan.

Mounted:SMB – Exclude the remote directories mounted on a device using the Samba protocol from scan.

AllRemoteMounted – Exclude all remote directories mounted on the device using the Samba and NFS protocols from scan.

<file system type> — Exclude all the resources of the specified device file system from scans.

Remote directories are excluded from scanning by the application only if they were mounted before the task was started. Remote directories mounted after the task is started are not excluded from scanning.

Page top

[Topic 246912]

Custom Scan task (Scan_File, ID:3)

The Custom Scan task is used to store the setting values that are applied by executing the kesl-control --scan-file command.

When running the command, the [ScanScope.item_#] and [ExcludedFromScanScope.item_#] sections in the settings of this task are not inherited from the original task with ID=3.

You can change scan settings for the Scan_File task from the command line.

Upon detecting malware, Kaspersky Endpoint Security may remove the infected file and terminate the malware process started from this file.

The table describes all available values and the default values of all the settings that you can specify for the Custom Scan task.

Custom Scan task settings

Setting

Description

Values

ScanFiles

Enables file scan.

Yes (default value) — Scan files.

No — Do not scan files.

ScanBootSectors

Enables boot sector scans.

Yes — Scan boot sectors.

No (default value) — Do not scan boot sectors.

ScanComputerMemory

Enables process memory and kernel memory scans.

Yes — Scan process memory and kernel memory.

No (default value) — Do not scan process memory and kernel memory.

ScanStartupObjects

Enables startup object scans.

Yes — Scan startup objects.

No (default value) — Do not scan startup objects.

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes (default value) — Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes (default value) — Scan self-extracting archives.

No — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

TimeLimit

Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 0.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

 

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, Kaspersky Endpoint Security immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Skip — The application does not try to disinfect or delete infected objects. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Skip or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified the second action, the application applies Skip as the second action.

Default value: Skip.

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeMasks.item_# setting from the scan.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from the scan.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Enables exclusion of objects containing the threats specified by the ExcludeThreats setting from scans.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

DeviceNameMasks.item_#

List of device names. The application will scan boot sectors of these devices.

The setting value cannot be empty. At least one device name mask must be specified to run this task.

AllObjects – scan boot sectors of all devices.

<device name mask> – Scan boot sectors of the devices whose names match the specified mask.

Default value: /** – any set of characters in the device name, including the / character.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan scope, which contains additional information about the scan scope. The maximum length of the string specified using this setting is 4096 characters.

Default value: All objects.

Example:

AreaDesc="Scanning of email databases"

 

UseScanArea

Enables scans of the specified scope. To run the task, enable scans of at least one scope.

Yes (default value) — Scan the specified scope.

No — Do not scan the specified scope.

AreaMask.item_#

Scan scope limitation. Within the scan scope, the application scans only the files that are specified using the masks in the shell format.

If this setting is not specified, the application scans all the objects in the scan scope. You can specify several values for this setting.

The default value is * (scan all objects).

Example:

AreaMask.item_<item number>=*doc

 

Path

Path to the directory with objects to be scanned.

 

<path to local directory> — Scan objects in the specified directory.

Shared:NFS — Scan the device file system resources that are accessible via the NFS protocol.

Shared:SMB – Scan the device file system resources that are accessible via the Samba protocol.

Mounted:NFS – Scan the remote directories mounted on a device using the NFS protocol.

Mounted:SMB – Scan the remote directories mounted on a device using the Samba protocol.

AllRemoteMounted – Scan all remote directories mounted on the device using the Samba and NFS protocols.

AllShared – Scan all the device file system resources that are accessible via the Samba and NFS protocols.

<file system type> — Scan all the resources of the specified device file system.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan exclusion scope, which contains additional information about the exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from scans.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limitation of scan exclusion scope. In the exclusion scope, the application excludes only the files that are specified using masks in the shell format.

If this setting is not specified, the application excludes all the objects in the exclusion scope. You can specify several values for this setting.

Default value: * (exclude all objects)

Path

Path to the directory with objects to be excluded.

<path to local directory> — Exclude objects in the specified directory (including subdirectories) from scans. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion /.snapshots/*/snapshot/.

Mounted:NFS– Exclude the remote directories mounted on a device using the NFS protocol from scan.

Mounted:SMB – Exclude the remote directories mounted on a device using the Samba protocol from scan.

AllRemoteMounted – Exclude all remote directories mounted on the device using the Samba and NFS protocols from scan.

<file system type> — Exclude all the resources of the specified device file system from scans.

Remote directories are excluded from scanning by the application only if they were mounted before the task was started. Remote directories mounted after the task is started are not excluded from scanning.

Page top

[Topic 199695]

Critical Areas Scan task (Critical_Areas_Scan, ID:4)

The Critical Areas Scan task allows you to scan boot sectors, startup objects, process memory, and kernel memory.

Upon detecting malware, Kaspersky Endpoint Security may remove the infected file and terminate the malware process started from this file.

The table describes all available values and the default values of all the settings that you can specify for the Critical Areas Scan task.

Critical Areas Scan task settings

Setting

Description

Values

ScanFiles

Enables file scan.

Yes — Scan files.

No (default value) — Do not scan files.

ScanBootSectors

Enables boot sector scans.

Yes (default value) — Scan boot sectors.

No — Do not scan boot sectors.

ScanComputerMemory

Enables process memory and kernel memory scans.

Yes (default value) — Scan process memory and kernel memory.

No — Do not scan process memory and kernel memory.

ScanStartupObjects

Enables startup object scans.

Yes (default value) — Scan startup objects.

No — Do not scan startup objects.

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes (default value) — Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes (default value) — Scan self-extracting archives.

No — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

TimeLimit

Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 0.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, Kaspersky Endpoint Security immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Skip — The application does not try to disinfect or delete infected objects. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Skip or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified the second action, the application applies Skip as the second action.

Default value: Skip.

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeMasks.item_# setting from the scan.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from the scan.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

Before specifying a value for this setting, make sure that the UseExcludeMasks setting is enabled.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Enables exclusion of objects containing the threats specified by the ExcludeThreats setting from scans.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

DeviceNameMasks.item_#

List of device names. The application will scan boot sectors of these devices.

The setting value cannot be empty. At least one device name mask must be specified to run this task.

AllObjects – scan boot sectors of all devices.

<device name mask> – Scan boot sectors of the devices whose names match the specified mask.

Default value: /** – any set of characters in the device name, including the / character.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan scope, which contains additional information about the scan scope. The maximum length of the string specified using this setting is 4096 characters.

Default value: All objects.

Example:

AreaDesc="Mail bases scan"

 

UseScanArea

Enables scans of the specified scope. To run the task, enable scans of at least one scope.

Yes (default value) — Scan the specified scope.

No — Do not scan the specified scope.

AreaMask.item_#

Scan scope limitation. Within the scan scope, the application scans only the files that are specified using the masks in the shell format.

If this setting is not specified, the application scans all the objects in the scan scope. You can specify several values for this setting.

The default value is * (scan all objects).

Example:

AreaMask.item_<item number>=*doc

 

Path

Path to the directory with objects to be scanned.

<path to local directory> — Scan objects in the specified directory.

Shared:NFS — Scan the device file system resources that are accessible via the NFS protocol.

Shared:SMB – Scan the device file system resources that are accessible via the Samba protocol.

Mounted:NFS – Scan the remote directories mounted on a device using the NFS protocol.

Mounted:SMB – Scan the remote directories mounted on a device using the Samba protocol.

AllRemoteMounted – Scan all remote directories mounted on the device using the Samba and NFS protocols.

AllShared – Scan all the device file system resources that are accessible via the Samba and NFS protocols.

<file system type> — Scan all the resources of the specified device file system.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the scan exclusion scope, which contains additional information about the exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from scans.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limitation of scan exclusion scope. In the exclusion scope, the application excludes only the files that are specified using masks in the shell format.

If this setting is not specified, the application excludes all the objects in the exclusion scope. You can specify several values for this setting.

Default value: * (exclude all objects)

Path

Path to the directory with objects to be excluded.

<path to local directory> — Exclude objects in the specified directory from scan. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion /.snapshots/*/snapshot/.

<path to local directory> – Exclude objects in the specified directory, as well as subdirectories, from scanning. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

In order to optimize the operation of scan tasks, it is recommended to add the path with snapshots mounted by the system in the read-only mode to the exclusions for the systems with the btrfs file system and enabled active snapshots. For example, for the systems based on SUSE/OpenSUSE, you can add the following exclusion /.snapshots/*/snapshot/.

Mounted:NFS– Exclude the remote directories mounted on a device using the NFS protocol from scan.

Mounted:SMB – Exclude the remote directories mounted on a device using the Samba protocol from scan.

AllRemoteMounted – Exclude all remote directories mounted on the device using the Samba and NFS protocols from scan.

<file system type> — Exclude all the resources of the specified device file system from scans.

Remote directories are excluded from scanning by the application only if they were mounted before the task was started. Remote directories mounted after the task is started are not excluded from scanning.

Page top

[Topic 234821]

Update task (Update, ID:6)

Kaspersky Endpoint Security protects the device only after the application databases are updated.

Updating the databases and application modules of Kaspersky Endpoint Security ensures up-to-date protection on your device. New viruses, malware, and other types of threats appear worldwide on a daily basis. The application databases contain information about the threats and the ways to neutralize them. To detect threats quickly, you are urged to regularly update the application databases and modules.

Current application license is required for regular database updates. If there is no current license, you will only be able to perform one update.

The main application update sources are Kaspersky update servers.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, databases on protected virtual machines are updated using a special Update local task, where the directory on the SVM is specified as the update source. The update task starts automatically. You cannot delete this task or change its settings.

Your device must be connected to the Internet to successfully download the update package from Kaspersky update servers. By default, Internet connection settings are determined automatically. If you use a proxy server, you will need to adjust the connection settings. The update package is downloaded using the Update task.

During an update, the following objects are downloaded and installed on your device:

  • Application databases. During installation, the application downloads the latest databases from one of the Kaspersky HTTP update servers. If the predefined task with default settings (ID=6) is used for updates, the application will update the databases every 60 minutes. You can edit the settings of the predefined task for database and application module updates and create user update tasks.

    If the database update download is interrupted or finishes with an error, the application continues to use the previously installed database version. If application databases were not installed before, the application continues functioning in "without databases" mode. Database and application module updates are still available.

    By default, the application logs the Databases are out of date event (BasesAreOutOfDate) if the last installed database updates were published on the Kaspersky server more than three but less than seven days ago. If the databases have not been updated for seven days, the application logs the Databases are extremely out of date (BasesAreTotallyOutOfDate) event. The database is up-to-date if it was downloaded less than three days ago.

  • Updating application modules. In addition to application databases, you can also update the application itself. Module updates fix vulnerabilities and enhance existing functions.

    The application module can be installed regardless of the state of the application (started or stopped, managed by a Kaspersky Security Center policy) and the update schedule. Kaspersky Endpoint Security continues protecting your device during the application update procedure. During the update, application settings and the application log file are migrated to the new version of the application. After the update, Kaspersky Endpoint Security needs to be restarted.

    If the transfer of application settings fails for any reason, the application is set to the default values.

    Changes to the application settings made after the update is complete and before the application restarts are not saved.

    After updating the application using an autopatch, the mechanism for interacting with the operating system firewall changes: the rules are managed using the iptables and iptables-restore system utilities.

    If the application does not work properly after the update, it automatically rolls back to the previous version. A message about the application rollback is displayed. It is recommended to contact Kaspersky Technical Support.

During an update, the application modules and databases on your device are compared with the up-to-date version at the update source. If your current databases and application modules differ from their respective up-to-date versions, the missing portions of the updates will be installed on your device.

If the databases are obsolete, the update package may be large, which may cause additional Internet traffic (up to several dozen MB). The amount of the disk space can be up to 3 GB.

In this Help section

About update sources

Starting and stopping a task

Update task settings

Page top

[Topic 197978]

About update sources

An update source is a resource that contains updates for Kaspersky Endpoint Security databases and application modules. Update sources can be FTP, HTTP, or HTTPS servers (such as Kaspersky Security Center and Kaspersky update servers), as well as local or network directories mounted by the user.

The default update sources for the predefined Update task are Kaspersky update servers. The update servers contain databases and application module updates for many Kaspersky applications. Updates are downloaded via HTTPS protocol.

If, for some reason, you cannot use Kaspersky update servers as the update source, you can receive updates from a custom update source such as a specified local or network directory (SMB/NFS) mounted by the user, or an FTP, HTTP, or HTTPS server. You can specify a custom update source in Update task settings.

Page top

[Topic 286869]

Starting and stopping a task

Kaspersky Endpoint Security protects the device only after the application databases are updated.

If the application database update was not performed during the initial configuration of the application, you can update the databases after installation using the predefined Update task on the command line.

To start the database update task, run the following command:

kesl-control --start-task 6|Update [-W]

Where the -W parameter enables the output of current events (event names and additional information about events) to the console while the task is running.

You can get information about the loaded application databases using the kesl-control --app-info command.

Information about the application databases is displayed in the following lines:

  • Last release date of databases. Date and time of the last release of the application databases.
  • Application databases. Whether the application databases are loaded.

You can also view information about events that occurred while the task was running in the application event log.

Page top

[Topic 197979]

Update task settings

The table describes all available values and default values of all the settings that you can specify for the Update task.

Update task settings

Setting

Description

Values

SourceType

Source from which the application receives updates.

KLServers (default value) — The application receives updates from one of the Kaspersky update servers. Updates are downloaded via HTTPS protocol.

SCServer — the application downloads updates to the protected device from Kaspersky Security Center Administration Server installed in your organization. You can select this update source if you use Kaspersky Security Center for centralized administration of device protection in your organization.

Custom — The application downloads updates from a custom source specified in the [CustomSources.item_#] section. You can specify directories on FTP, HTTP, and HTTPS servers or directories on any device mounted on the protected client device, including directories on remote devices mounted via the Samba or NFS protocols.

UseKLServersWhenUnavailable

The application's access to Kaspersky update servers if all custom update sources are unavailable.

Yes (default value) — The application will connect to Kaspersky update servers if all custom update sources are unavailable.

No — The application will not connect to Kaspersky update servers if all custom update sources are unavailable.

ApplicationUpdateMode

Application update download and installation mode.

Disabled — Do not download or install application updates.

DownloadOnly (default value) — Download application updates, but do not install them.

DownloadAndInstall — Automatically download and install application updates. After updates are installed, the application will restart automatically.

ConnectionTimeout

Response timeout (in seconds) of an update source while attempting to connect to it. If an update source does not respond within the specified time interval, the application contacts the next update source in the list.

You can use only integers within the range from 0 to 120.

Default value: 10.

The [CustomSources.item_#] section contains the following settings:

URL

Address of the custom update source on the local area network or the Internet.

The default value is not defined.

Examples:

URL=http://example.com/bases/ – address of the HTTP server with the directory that contains updates.

URL=/home/bases/ – directory on the protected computer that contains application databases.

 

Enabled

Enables the use of the update source specified as the value of the URL setting.

To run the task, at least one update source needs to be enabled.

Yes – the application uses the update source.

No – The app doesn't use the update source.

The default value is not defined.

Page top

[Topic 197980]

Rollback task (Rollback, ID:7)

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, use of an Update local task is not supported.

After the application databases are updated for the first time, the rollback of the application databases to their previous versions becomes available.

Every time a user starts the update process, Kaspersky Endpoint Security creates a backup copy of the current application databases. This allows you to roll back the application databases to a previous version if needed. Rolling back the last database updates may be useful, for example, if the new application database version contains invalid signatures, which causes Kaspersky Endpoint Security to block safe applications.

The rollback task does not have any settings.

Page top

[Topic 198397]

Licensing task (License, ID:9)

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the application does not need to be activated separately. You activate Kaspersky Hybrid Cloud Security for Virtualization Light Agent; activation is performed on the Protection Server (a component of Kaspersky Hybrid Cloud Security for Virtualization Light Agent) by adding a license key to the SVM. License key management commands return an error.

The Licensing task allows you to manage Kaspersky Endpoint Security license keys.

In this Help section

Adding an active key

Adding a reserve key

Removing an active key

Removing a reserve key

Page top

[Topic 197982]

Adding an active key

The command for adding a license key can only be executed if the application is being used in standalone mode. When using the application in Light Agent mode for protecting virtual environments, this command fails with an error.

The kesl-control --add-active-key command adds an active key.

Command syntax

kesl-control [-L] --add-active-key <path to key file>|<activation code>

Arguments and keys

<path to the key file> – path to the key file. If the key file is located in the current directory, it is sufficient to specify only the file name.

<activation code>activation code.

Example:

Add a key as an active key using the /home/test/00000001.key file:

kesl-control --add-active-key /home/test/00000001.key

Page top

[Topic 197983]

Adding a reserve key

The command for adding a license key can only be executed if the application is being used in standalone mode. When using the application in Light Agent mode for protecting virtual environments, this command fails with an error.

The kesl-control --add-reserve-key command adds a reserve key.

If an active key has not been added, the key will be added as the active key.

Command syntax

kesl-control [-L] --add-reserve-key <path to key file>|<activation code>

Arguments and keys

<path to the key file> – path to the key file. If the key file is located in the current directory, it is sufficient to specify only the file name.

<activation code>activation code.

Example:

Add a reserve key using the /home/test/00000002.key file:

kesl-control --add-reserve-key /home/test/00000002.key

Page top

[Topic 197984]

Removing an active key

The command for deleting a license key can only be executed if the application is being used in standalone mode. When using the application in Light Agent mode for protecting virtual environments, this command fails with an error.

The kesl-control --remove-active-key command removes the active key.

Command syntax

kesl-control [-L] --remove-active-key

Page top

[Topic 197985]

Removing a reserve key

The command for deleting a license key can only be executed if the application is being used in standalone mode. When using the application in Light Agent mode for protecting virtual environments, this command fails with an error.

The kesl-control --remove-reserve-key command removes the reserve key.

Command syntax

kesl-control [-L] --remove-reserve-key

Page top

[Topic 198398]

Storage management task (Backup, ID:10)

The Storage is a list of backup copies of files that have been deleted or modified during the disinfection process. A backup copy is a copy of a file created before the first attempt to disinfect or delete this file. Backup copies of files are stored in a special format and do not pose a threat.

By default, the Storage is located in the /var/opt/kaspersky/kesl/common/objects-backup/ directory. Files in the Storage may contain personal data. Root privileges are required to access files in the Storage.

Sometimes it is not possible to maintain the integrity of files during disinfection. If you partially or completely lose access to important information in a disinfected file after disinfection, you can attempt to restore the file from the disinfected copy to the file's original directory.

In this Help section

Storage management task settings

Viewing IDs of the objects in the Storage

Restoring objects from the Storage

Removing objects from the Storage

Page top

[Topic 197987]

Storage management task settings

The table describes all available values and the default values of all the settings that you can specify for the Storage management task.

Storage management task settings

Setting

Description

Value

DaysToLive

Time period for storing objects in the Storage (in days).

To remove the time limit for storing objects in the Storage, specify 0.

0 – the time period for storing objects in the Storage is not limited.

Default value: 90.

BackupSizeLimit

Maximum size of the Storage (MB). When the maximum Storage size is reached, the application deletes the oldest objects.

To remove the Storage size limit, specify 0.

0–999999

0 – the Storage size is not limited.

Default value: 0.

BackupFolder

Path to the Storage directory. You can specify a custom Storage directory that is different from the default directory. You can use directories on any device as the Storage. It is not recommended to assign directories that are located on remote devices, such as those mounted via the Samba and NFS protocols.

Kaspersky Endpoint Security starts moving the objects to the specified directory after you change the settings and restart the application.

If the specified directory does not exist or is unavailable, the application uses the default directory.

Default value: /var/opt/kaspersky/kesl/common/objects-backup/

Root privileges are required to access the default Storage directory.

Page top

[Topic 197988]

Viewing identifiers of the objects in Storage

When an object is placed in the Storage, the application assigns a numeric ID to it. This ID is used to perform actions on the object, such as restoring or removing the object from the Storage.

To view the IDs of the objects in the Storage, execute the following command:

kesl-control -B --query

The object ID is displayed in the ObjectId string.

Page top

[Topic 197990]

Restoring objects from the Storage

Kaspersky Endpoint Security stores objects in the Storage in encrypted form to keep the protected device safe from their potential harmful effects.

You can restore objects from Storage if necessary. You may need to restore objects, for example, if while disinfecting an infected file the application failed to preserve its integrity, which made the information in the file inaccessible. You can save the object under a new name when restoring it from the Storage. If a file has been deleted from an archive, restoring it will restore the entire original archive.

Restoring infected objects may lead to a device infection.

To restore an object under its original name to its original location, execute the following command:

kesl-control [-B] --restore <object ID>

where <object ID> is the ID of the object in the Storage.

To restore an object under a new name to a specified directory, execute the following command:

kesl-control [-B] --restore <object ID> --file <file name and path to the file directory>

If the specified directory does not exist, the application creates it.

Page top

[Topic 197991]

Removing objects from the Storage

To remove an object from the Storage, execute the following command:

kesl-control -B --mass-remove --query "ObjectId == '<object ID>'"

Example:

To remove an object with ID=15:

kesl-control -B --mass-remove --query "ObjectId == '15'"

To remove several objects from the Storage, execute the following command:

kesl-control -B --mass-remove --query "<field> <logical expression> '<value>' [and <field> <logical expression> '<value>']"

Example:

To remove objects that contain "test" in their names or paths:

kesl-control -B --mass-remove --query "FileName like '%test%'"

To remove all objects from the Storage, execute one of the following commands:

kesl-control -B --mass-remove

, or

kesl-control -B --mass-remove --query

Page top

[Topic 197992]

System Integrity Monitoring task (System_Integrity_Monitoring, ID:11)

The System Integrity Monitoring task is designed to track actions performed on files and directories in the monitoring scope specified in the task settings. You can use the task to find file changes that may indicate a security breach on a protected server.

To use the task, a license that includes the corresponding function is required.

System Integrity Monitoring can be performed in real-time when you run the On-access File Integrity Monitoring (OAFIM) task. You can also create and run On-demand File Integrity Monitoring (ODFIM) tasks.

Both OAFIM and ODFIM tasks send notifications about changes to an object access control list. For the OAFIM task, details about what exactly was changed are not reported. For the ODFIM task, information about attribute changes and file/directory moves are reported.

In this Help section

On-access File Integrity Monitoring (OAFIM)

On-demand File Integrity Monitoring (ODFIM)

On-access File Integrity Monitoring task settings

On-demand File Integrity Monitoring settings

Page top

[Topic 197994]

On-access File Integrity Monitoring (OAFIM)

While the OAFIM task is running, each object change is determined through real-time interception of file operations in real-time mode. When an object changes, Kaspersky Endpoint Security sends an event to Kaspersky Security Center Administration Server. A file checksum is not calculated during the task run. The application task does not monitor changes in files (attributes and content) with hard links that are outside the monitoring scope. The application monitors operations on specific files or the monitoring scopes specified in the task settings.

Monitoring scopes

Monitoring scopes must be specified for the System Integrity Monitoring task. The administrator can change monitoring scopes in real-time mode. You can specify several monitoring scopes. If no monitoring scope is specified, task settings cannot be saved in the configuration file.

Monitoring exclusions

You can create exclusions for the monitoring scope. Exclusions are specified for each individual scope and only work for the indicated monitoring scope. You can specify several monitoring exclusions.

Exclusions have a higher priority than the monitoring scope and are not monitored by a task, even if a specific directory or file is in the monitoring scope. If the settings for one of the rules specify a monitoring scope that is at a lower level than a directory specified in exclusions, the monitoring scope is not considered when the task is run.

To specify exclusions, you can use the same command line shell masks that are used to specify monitoring scopes.

When a monitoring scope or exclusion scope is added, the application does not check whether the specified directory exists.

Monitored settings

Changes to the following settings are monitored when the System Integrity Monitoring task runs:

  • Content (write (), truncate (), etc.)
  • Metadata (possession rights (chmod/chown))
  • Time stamps (utimensat)
  • Extended attributes ((setxattr) and others)

The technical limitations of the Linux operating system prevent the System Integrity Monitoring task from detecting which administrator or process made changes to the file.

Page top

[Topic 197995]

On-demand File Integrity Monitoring (ODFIM)

While the ODFIM task is running, each object change is determined by comparing the current state of the monitored object to its original state, which was previously established as a baseline, based on the following criteria: file hash, file modification time, and file size.

The baseline is created during the first run of the ODFIM task on the device. You can create several ODFIM tasks. For each ODFIM task, a separate baseline is created. The task is performed only if the baseline corresponds to the monitoring scope. If the baseline does not match the monitoring scope, Kaspersky Endpoint Security creates a system integrity violation event. The baseline contains paths to monitored objects and their metadata. The baseline may also contain personal data.

The baseline is rebuilt after an ODFIM task has finished. You can rebuild a baseline for the task using the RebuildBaseline setting. Also, a baseline is rebuilt when the settings of a task change, for example, if a new monitoring scope is added. The baseline will be rebuilt during the next task run. You can delete a baseline by deleting the corresponding ODFIM task.

The ODFIM task creates a baseline storage on the device that has the System Integrity Monitoring component installed. By default, the storage for baselines is located in /var/opt/kaspersky/kesl/private/fim.db. Root privileges are required to access a database that contains baselines.

Page top

[Topic 197996]

On-access File Integrity Monitoring task settings

The table describes all available values and default values of all the settings that you can specify for the On-access File Integrity Monitoring task.

On-access File Integrity Monitoring task settings

Setting

Description

Values

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeThreats.item_# setting from the monitoring scope.

This setting applies only if the ExcludeMasks.item_# setting is specified.

Yes — Exclude the objects specified by the ExcludeMasks.item_# setting from the monitoring scope.

No (default value) — Do not exclude the objects specified by the ExcludeMasks.item_# setting from the monitoring scope.

ExcludeMasks.item_#

Excludes objects from monitoring by names or masks. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

Before specifying a value for this setting, make sure that the UseExcludeMasks setting is enabled.

You can specify several masks. Each mask must be specified on a new line with a new index.

The default value is not defined.

The [ScanScope.item_#] section contains the monitoring scopes of the System Integrity Monitoring task. At least one monitoring scope must be specified for the task. You can specify several [ScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of monitoring scope; contains additional information about the monitoring scope.

The default value is not defined.

UseScanArea

Enables monitoring of the specified scope.

Yes (default value) — Monitor the specified scope.

No — Do not monitor the specified scope.

Path

Path to the monitoring directory.

You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Default value: /opt/kaspersky/kesl/

AreaMask.item_#

Monitoring scope limitation. Within the monitoring scope, the application scans only the objects that are specified using the masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (all objects are monitored)

The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section will be excluded from monitoring. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can specify several [ExcludedFromScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the monitoring exclusion scope, which contains additional information about the monitoring exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from monitoring.

Yes (default value) — Exclude the specified scope from monitoring.

No — Do not exclude the specified scope from monitoring.

Path

Path to the directory with objects excluded from monitoring.

You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The default value is not defined.

AreaMask.item_#

Limitation of monitoring exclusion scope. In the monitoring exclusion scope, the application only excludes the objects that are specified using masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (exclude all objects from monitoring)

Page top

[Topic 197997]

On-demand File Integrity Monitoring settings

The table describes all available values and default values of all the settings that you can specify for the On-demand File Integrity Monitoring task.

On-demand File Integrity Monitoring settings

Setting

Description

Values

RebuildBaseline

Enables rebuilding a baseline after the ODFIM task has finished.

Yes — Rebuild a baseline after the ODFIM task has finished.

No (default value) — Do not rebuild a baseline after the ODFIM task has finished.

CheckFileHash

Enables hash check (SHA-256).

Yes — Enable hash check.

No (default value) — Disable hash check. If this check is disabled, the application compares only the file size (if the file size has not changed, then the modification time is not considered a critical parameter).

TrackDirectoryChanges

Enables directory monitoring.

Yes — Monitor directories.

No (default value) — Do not monitor directories.

TrackLastAccessTime

Enables tracking last file access time. In the Linux operating systems it is the noatime setting.

Yes — Track last file access time.

No (default value) — Do not track last file access time.

UseExcludeMasks

Enables monitoring scope exclusions for objects specified by the ExcludeMasks.item_# setting.

This setting only applies if a value is specified for the ExcludeMasks.item_# setting.

Yes — Exclude the objects specified by the ExcludeMasks.item_# setting from the monitoring scope.

No (default value) — Do not exclude the objects specified by the ExcludeMasks.item_# setting from the monitoring scope.

ExcludeMasks.item_#

Excludes objects from monitoring by names or masks. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

Before specifying a value for this setting, make sure that the UseExcludeMasks setting is enabled.

You can specify several masks. Each mask must be specified on a new line with a new index.

The default value is not defined.

The [ScanScope.item_#] section contains the monitoring scopes of the System Integrity Monitoring task. At least one monitoring scope must be specified for the task. You can specify several [ScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of monitoring scope; contains additional information about the monitoring scope.

The default value is not defined.

UseScanArea

Enables monitoring of the specified scope.

Yes (default value) — Monitor the specified scope.

No — Do not monitor the specified scope.

Path

Path to the monitoring directory.

You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Default value: /opt/kaspersky/kesl/

AreaMask.item_#

Monitoring scope limitation. Within the monitoring scope, the application scans only the objects that are specified using the masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (all objects are monitored)

The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section will be excluded from monitoring. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can specify several [ExcludedFromScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the monitoring exclusion scope, which contains additional information about the monitoring exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from monitoring.

Yes (default value) — Exclude the specified scope from monitoring.

No — Do not exclude the specified scope from monitoring.

Path

Path to the directory with objects excluded from monitoring.

You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The default value is not defined.

AreaMask.item_#

Limitation of monitoring exclusion scope. In the monitoring exclusion scope, the application only excludes the objects that are specified using masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (exclude all objects from monitoring)

Page top

[Topic 234820]

Firewall Management task (Firewall_Management, ID:12)

During use on local area networks (LANs) and the Internet, a device is exposed to viruses, other malware, and a variety of attacks that exploit vulnerabilities in operating systems and software.

The operating system firewall protects data stored on the user device by blocking most threats when the device is connected to the internet or a LAN.

The operating system firewall allows you to detect all network connections on the user device and provide a list of their IP addresses. The Firewall Management task allows you to set the status of the network connections by configuring the network packet rules. Configuring network packet rules lets you specify the desired level of the device protection, from blocking Internet access for all applications to allowing unlimited access. All outbound connections are allowed by default, unless corresponding blocking rules for the Firewall Management task are specified.

When the Firewall Management task is enabled, Kaspersky Endpoint Security automatically deletes all custom rules configured for the firewall with tools provided by the operating system. These rules are not restored after the task is disabled. If required, save the custom firewall rules before enabling the Firewall Management task.

While the Firewall Management task is running, Kaspersky Endpoint Security blocks any configuration of the operating system's firewall settings, for example, any attempt by a program or utility to add or delete a firewall rule. Kaspersky Endpoint Security checks the operating system firewall every 60 seconds and restores the set of firewall rules if necessary. The checking period cannot be changed.

In the Red Hat Enterprise Linux and CentOS 8 operating systems, firewall rules created using Kaspersky Endpoint Security can only be viewed through the application (kesl-control -F --query command).

The operating system firewall continues to be checked even when the Firewall Management task is stopped. This allows the application to restore dynamic rules.

To avoid problems on systems with nftables, Kaspersky Endpoint Security uses the iptables and iptables-restore system utilities when adding rules for the system firewall.

The application creates a special chain of allowing rules called kesl_bypass, and adds it at the top of the list in the mangle table of the iptables and ip6tables utilities. The rules of the kesl_bypass chain make it possible to exclude traffic from scans by Kaspersky Endpoint Security. The rules in this chain can be changed by means of the operating system.

When the application is removed, the kesl_bypass rule chain is removed from iptables and ip6tables only if it was empty.

It is recommended to disable other operating system firewall management tools before enabling the Firewall Management task.

In this Help section

About network packet rules

About dynamic rules

About the predefined network zone names

Firewall Management task settings

Adding a network packet rule

Deleting a network packet rule

Changing the execution priority of a network packet rule

Adding a network address to a zone section

Deleting a network address from a zone section

Page top

[Topic 198000]

About network packet rules

Network packet rules are actions taken by the Kaspersky Endpoint Security to allow or deny a detected network connection attempt.

Network packet rules impose restrictions on network packets regardless of the application. Such rules restrict inbound and outbound network traffic through specific ports of the selected data protocol.

All outbound connections are allowed by default (default action setting), unless the corresponding blocking rules for the Firewall Management are specified. The default action is performed with the lowest priority: if no other network packet rule has been triggered or if no network packet rules have been specified, the connection is allowed.

Firewall Management specifies certain network packet rules by default. You can create your own network packet rules and specify an execution priority for each network packet rule.

Page top

[Topic 198001]

About dynamic rules

Kaspersky Endpoint Security allows dynamic rules to be added to, or deleted from, the firewall to ensure the application works properly. For example, Network Agent adds dynamic rules that allow connections to Kaspersky Security Center initiated by the application or by Kaspersky Security Center. The rules of the Anti-Cryptor are also dynamic.

If Kaspersky Endpoint Security is used in Light Agent mode, dynamic rules are automatically added to the firewall that allow connections to the SVM and Integration Server.

Kaspersky Endpoint Security does not control dynamic rules and does not block application components' access to network resources. Dynamic rules do not depend on the Firewall Management state (started/stopped) or on changes of the Firewall Management settings. The execution priority of dynamic rules is higher than the priority of network packet rules. The application restores a set of dynamic rules if any of them are deleted, for example, by using the iptables utility.

You can view the set of dynamic rules (using the kesl-control -F --query command); however the dynamic rules settings cannot be modified.

Page top

[Topic 198002]

About the predefined network zone names

A predefined network zone is a specific group of IP addresses or subnets. Using a predefined network zone, you can use the same rules for several IP addresses or subnets without having to create a separate rule for each IP address or subnet. The network zone can be used as the value of the "remote address" parameter when creating a network packet rule. Kaspersky Endpoint Security has three predefined network zones with specific names:

  • Public. Add a network address or subnet to this zone if it is assigned to networks that are not protected by any anti-virus applications, firewalls, or filters (for example, for Internet cafe networks).
  • Local. Add a network address or subnet to this zone if it is assigned to networks whose users are trusted to access files and printers on this device (for example, a LAN or home network).
  • Trusted. This zone is intended for a safe network in which the device is not exposed to attacks or unauthorized data access attempts.

You cannot create or delete a network zone. You can add or delete IP addresses and subnets to/from a network zone.

Page top

[Topic 198003]

Firewall Management task settings

The table describes all available values and the default values of all the settings that you can specify for the Firewall Management task.

Firewall Management task settings

Setting

Description

Values

DefaultIncomingAction

The default action to perform on an inbound connection if no network rules apply to this connection type.

Allow (default value) — Allow inbound connections.

Block — Block inbound connections.

DefaultIncomingPacketAction

The default action to perform on an incoming packet if no network packet rules apply to this connection type.

Allow (default value) — Allow incoming packets.

Block — Block incoming packets.

OpenNagentPorts

Adds Network Agent dynamic rules to the network packet rules.

Yes (default value) – Add Network Agent dynamic rules to the network packet rules.

No – Do not add Network Agent dynamic rules to the network packet rules.

The [PacketRules.item_#] section contains network packet rules for the Firewall Management task. You can specify several [PacketRules.item_#] sections in any order. The application processes the scopes by index in ascending order.

Each [PacketRules.item_#] section contains the following settings:

Name

Network packet rule name.

Default value: Packet rule #<n>, where n is an index.

FirewallAction

Action to be performed on connections specified in this network packet rule.

Allow (default value) — Allow network connections.

Block — Block network connections.

Protocol

Type of protocol for which network activity is to be monitored.

Any (default value) — The Firewall Management task monitors all network activity.

TCP

UDP

ICMP

ICMPv6

IGMP

GRE

RemotePorts

Port numbers of the remote devices whose connection is monitored.

This setting can only be specified if the Protocol setting is set to TCP or UDP.

An integer or interval can be specified for this setting.

Any (default value) — Monitor all remote ports.

065535.

LocalPorts

Port numbers of the local devices whose connection is monitored.

This setting can only be specified if the Protocol setting is set to TCP or UDP.

An integer or interval can be specified for this setting.

Any (default value) — Monitor all local ports.

065535.

ICMPType

ICMP packet type.

This setting can only be specified if the Protocol setting is set to ICMP or ICMPv6.

Any (default value) — Monitor all ICMP packet types.

Integer number according to the data transfer protocol specification.

ICMPCode

ICMP packet code.

This setting can only be specified if the Protocol setting is set to ICMP or ICMPv6.

Any (default value) — Monitor all ICMP packet codes.

Integer number according to the data transfer protocol specification.

Direction

Direction of the monitored network activity.

IncomingOutgoing or InOut (default value) — Monitor both inbound and outbound connections.

Incoming or In — Monitor inbound connections.

Outgoing or Out — Monitor outbound connections.

IncomingPacket or InPacket — Monitor incoming packets.

OutgoingPacket or OutPacket — Monitor outgoing packets.

IncomingOutgoingPacket or InOutPacket — Monitor both incoming and outgoing packets.

RemoteAddress

The network addresses of the remote devices that can send and receive network packets.

Any (default value) — Monitor network packets sent and/or received by remote devices with any IP address.

Trusted — Predefined network zone for trusted networks.

Local — Predefined network zone for local networks.

Public — Predefined network zone for public networks.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

LocalAddress

Network addresses of devices that have Kaspersky Endpoint Security installed and can send and/or receive network packets.

Any (default value) — Monitor network packets sent and/or received by local devices with any IP address.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

LogAttempts

Specify whether you want the actions of the network rule to be included in the report.

Yes — Include actions in the report.

No (default value) — Do not include actions in the report.

The [NetworkZonesPublic] section contains network addresses associated with public networks.

You can specify several IP addresses or subnets of IP addresses.

Address.item_#

Specifies IP addresses or subnets of IP addresses.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

Default value: "" (no network addresses in this zone)

The [NetworkZonesLocal] section contains network addresses associated with local networks.

You can specify several IP addresses or subnets of IP addresses.

Address.item_#

Specifies IP addresses or subnets of IP addresses.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

Default value: "" (no network addresses in this zone)

The [NetworkZonesTrusted] section contains network addresses associated with trusted networks.

You can specify several IP addresses or subnets of IP addresses.

Address.item_#

Specifies IP addresses or subnets of IP addresses.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

Default value: "" (no network addresses in this zone)

Page top

[Topic 198004]

Adding a network packet rule

You can manually add a network packet rule.

You can add only one network packet rule at a time.

To add a network packet rule, execute the following command:

kesl-control -F --add-rule --name <rule name> --action <action> --protocol <protocol> --direction <direction> --remote <remote address> --local <local address> --at <index in a list of network packet rules>

A section containing new network packet rule settings is added to the Firewall Management task configuration file. If you did not specify a certain setting in the command, the default value is set.

The --at setting lets you specify the index of the created rule in the list of network packet rules. If the --at setting is not specified or its value is larger than the number of rules in the list, the new rule is added to the end of the list.

Examples:

To create a rule that blocks all incoming and established connections to TCP port 23, execute the following command:

kesl-control --add-rule --name Block_Telnet --action Block --direction in --protocol TCP --local any:23

--remote any

To create a rule that blocks incoming and established connections via the TCP port 23 for the Public network zone, execute the following command:

kesl-control --add-rule --name Block_Telnet --action Block --direction in --protocol TCP --local any:23

--remote Public

Page top

[Topic 198005]

Deleting a network packet rule

You can manually delete a network packet rule.

You can delete only one network packet rule at a time.

To delete a network packet rule, execute one of the following commands:

  • kesl-control -F --del-rule --name <rule name>

    A network packet rule will be deleted by its name. If a list of network packet rules contains several rules with the same name, the application does not delete any of them.

  • kesl-control -F --del-rule --index <index>

    A network packet rule will be deleted by its index in the network packet rules list.

A section with network packet rules settings is deleted from the configuration file of the Firewall Management task.

If the list of network packet rules does not contain a rule with a specified name or index, an error occurs.

Page top

[Topic 198006]

Changing the execution priority of a network packet rule

You can manually change a network packet rule's execution priority.

To change a network packet rule's execution priority, execute the following command:

kesl-control -F --move-rule [--name <rule name>|--index <index>] --at <index>

The execution priority of the network packet rule will be changed according to the specified index.

Page top

[Topic 198007]

Adding a network address to a zone section

You can manually add network addresses associated with a certain type of network to the configuration file of the Firewall Management task.

To add a network address to the zone, execute the following command:

kesl-control -F --add-zone <Public|Local|Trusted> --address <address>

The network address is added to the indicated zone section in the task configuration file.

Page top

[Topic 198008]

Deleting a network address from a zone section

You can manually delete network addresses associated with a certain type of network from the configuration file of the Firewall Management task. This may be useful if the network addresses are not used any more.

To delete a network address from a zone, execute the following command:

kesl-control -F --del-zone <zone> [--address <address>| --index <index address in the zone>]

The specified network address will be deleted from the indicated zone section in the configuration file.

If a zone contains several items with the same network address, the --del-zone command will not be executed.

If the specified network address or index does not exist, an error message is generated.

Page top

[Topic 198336]

Anti-Cryptor task (Anti_Cryptor, ID:13)

The Anti-Cryptor task allows you to protect your files in the local directories with network access by SMB/NFS protocols from remote malicious encrypting.

While the Anti-Cryptor task is running, Kaspersky Endpoint Security scans remote computers' calls to access files located in the shared network directories of the protected device. If the application considers a remote device actions on network file resources to be malicious encrypting, this device is added to a list of untrusted devices and loses access to the shared network directories. By default, the application blocks access of untrusted devices to network file resources for 30 minutes. The application does not consider actions to be encryption if encryption activity is detected in directories excluded from the protection scope of the Anti-Cryptor task.

To use the task, a license that includes the corresponding function is required.

For the Anti-Cryptor task to perform correctly, at least one of the services (Samba or NFS) must be installed in the operating system. The NFS service requires the rpcbind package to be installed.

The Anti-Cryptor task runs correctly with SMB1, SMB2, SMB3, NFS3, TCP/UDP, and IP/IPv6 protocols. Working with NFS2 and NFS4 protocols is not supported. It is recommended to configure your server settings so that the NFS2 and NFS4 protocols cannot be used to mount resources.

The Anti-Cryptor task does not block access to network file resources until the host's activity is identified as malicious. So, at least one file will be encrypted before the application detects malicious activity.

In this Help section

About blocking access to devices

Anti-Cryptor task settings

Viewing the list of blocked devices

Allowing blocked devices

Page top

[Topic 198010]

About blocking access to devices

When malicious encryption activity is detected, the application creates and enables a rule for the operating system firewall that blocks network traffic from a compromised device. The compromised device is added to the list of blocked devices. The application blocks access to shared network directories for all remote devices in the list of blocked devices. Information about blocked devices from a protected server is sent to Kaspersky Security Center.

Firewall rules created by the Anti-Cryptor task cannot be deleted using the iptables utility, since the application restores a set of rules every minute. Use the --allow-hosts command to unblock a device.

By default, the application removes untrusted devices from the list 30 minutes after being added to the list. Devices' access to network file resources is restored automatically after they are deleted from the list. You can change the list of blocked devices and specify the period after which the blocked devices will be automatically unblocked.

Page top

[Topic 198011]

Anti-Cryptor task settings

The table describes all available values and the default values of all the settings that you can specify for the Anti-Cryptor task.

Anti-Cryptor task settings

Setting

Description

Values

UseHostBlocker

Enables untrusted hosts blocking.

If untrusted hosts blocking is disabled, the application still scans the actions of the remote devices on network file resources for malicious encryption when the Anti-Cryptor task is running. If malicious activity is detected, the EncryptionDetected event is created, but the attacking device is not blocked.

Yes (default value): enable untrusted hosts blocking.

No: disable untrusted hosts blocking.

BlockTime

The time an untrusted device is blocked (in minutes).

If a compromised host is blocked, and you change a value for the BlockTime setting, the blocking time for this host will not change. The blocking time is not a dynamic value, and is calculated at the moment of blocking.

Integer from 1 to 4294967295.

Default value: 30.

UseExcludeMasks

Enables exclusion of the objects specified by the ExcludeMasks.item_# setting from the protection scope.

This setting applies only if the ExcludeMasks.item_# setting is specified.

Yes — Exclude the objects specified by the ExcludeMasks.item_# setting from the protection scope.

No (default value) — Do not exclude the objects specified by the ExcludeMasks.item_# setting from the protection scope.

ExcludeMasks.item_#

Excludes objects from the protection scope by names or masks. You can use this setting to exclude an individual file from the specified protection scope by name or exclude several files at once using masks in the shell format.

Before specifying a value for this setting, make sure that the UseExcludeMasks setting is enabled.

If you want to specify several masks, specify each mask on a new line with a new index.

The default value is not defined.

The [ScanScope.item_#] section contains the scopes protected by the application. For the Anti-Cryptor task, you need to specify at least one protection scope; you can only specify shared directories.

You can specify several [ScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of protection scope; contains additional information about the protection scope.

Default value: All shared directories.

UseScanArea

Enables protection of the specified scope. To run the task, enable protection of at least one scope.

Yes (default value) — Protect the specified scope.

No — Do not protect the specified scope.

AreaMask.item_#

Protection scope limitation. In the protection scope, the application protects only the objects that are specified using the masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (protect all objects)

Path

Path to the directory with the objects to be protected.

<path to local directory> – Protect a local directory accessible via SMB/NFS. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

AllShared (default value) — Protect all resources accessible via SMB/NFS.

Shared:SMB — Protect resources accessible via SMB.

Shared:NFS — Protect resources accessible via NFS.

The [ExcludedFromScanScope.item_#] section contains the objects to be excluded from all [ScanScope.item_#] sections. The objects that match the rules of any [ExcludedFromScanScope.item_#] section are not scanned. The format of the [ExcludedFromScanScope.item_#] section is similar to the format of the [ScanScope.item_#] section. You can specify several [ExcludedFromScanScope.item_#] sections in any order. The application processes the scopes by index in ascending order.

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the protection exclusion scope, which contains additional information about the exclusion scope.

Default value: All objects.

UseScanArea

Excludes the specified scope from protection.

Yes (default value) — Exclude the specified scope from protection.

No — Do not exclude the specified scope from protection.

AreaMask.item_#

Limitation of the protection exclusion scope. In the exclusion scope, the application excludes only the objects that are specified using masks in the shell format.

You can specify several AreaMask.item_# items in any order. The application processes the scopes by index in ascending order.

Default value: * (exclude all objects).

Path

Path to the directory with objects excluded from protection.

<path to local directory> — Exclude objects in the specified directory from protection. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Mounted:NFS– Exclude the remote directories mounted on a client device using the NFS protocol from protection.

Mounted:SMB– Exclude the remote directories mounted on a client device using the Samba protocol from protection.

AllRemoteMounted– Exclude all remote directories mounted on a client device using the Samba and NFS protocols from protection.

Page top

[Topic 198012]

Viewing the list of blocked devices

You can view the list of devices blocked by the Anti-Cryptor task.

To view the list of blocked devices, execute the following command:

kesl-control -[H] --get-blocked-hosts

The application will display blocked devices.

Page top

[Topic 198013]

Allowing blocked devices

You can manually unblock devices that were blocked by the Anti-Cryptor task, and restore network access to them.

To unblock devices, execute the following command:

kesl-control [-H] --allow-hosts <device>

where <device> can be a list of valid IPv4/IPv6 addresses (including addresses in short form) or subnets. Also, you can specify devices as a list.

Specified devices are unblocked.

Examples:

IPv4 addresses:

dec - 192.168.0.1

dec - 192.168.0.0/24

IPv6 addresses:

hex - FEDC:BA98:7654:3210:FEDC:BA98:7654:3210

hex - FEDC:BA98:7654:3210:FEDC:BA98:7654:3210%1

hex - 2001:db8::ae21:ad12

hex - ::ffff:255.255.255.254

hex - ::

Page top

[Topic 250529]

Web Threat Protection task (Web_Threat_Protection, ID:14)

While the Web Threat Protection task is running, the application scans inbound traffic and prevents download of malicious files from the Internet and also blocks access to phishing, adware, and other dangerous websites. The application scans HTTP, HTTPS, and FTP traffic. Also, the application scans websites and IP addresses. You can specify network ports or network port ranges to be monitored.

Removing application certificates may cause the Web Threat Protection task to work incorrectly.

By default, the Web Threat Protection task does not run. Moreover, the task starts automatically if one of the following browser executable files is found in the system, including in snap format:

  • chrome
  • chromium
  • chromium-browser
  • firefox
  • firefox-esr
  • google-chrome
  • opera
  • yandex-browser

To monitor HTTPS traffic, enable secure connection scan.

To monitor FTP traffic, specify the following setting value: MonitorNetworkPorts=All.

Kaspersky Endpoint Security adds a special chain of allowing rules (kesl_bypass) to the list in the mangle table of the iptables and ip6tables utilities. This chain of allowing rules makes it possible to exclude traffic from scans by the application. If traffic exclusion rules are configured in the chain, they affect the operation of the Web Threat Protection task.

When a website is opened, the Web Threat Protection task performs the following:

  1. Checks the website security using the downloaded application databases.
  2. Checks the website security using heuristic analysis, if enabled.

    During heuristic analysis, Kaspersky Endpoint Security analyzes the activity of applications in the operating system. Heuristic analysis can detect dangerous objects for which there are currently no records in Kaspersky Endpoint Security databases.

  3. Checks the reliability of a website using Kaspersky reputation databases if use of Kaspersky Security Network is enabled.

    You are advised to enabled use of Kaspersky Security Network to help Web Threat Protection work more effectively.

  4. Blocks or allows opening of the website.

On attempt to open a dangerous website, the application performs the following:

  • For HTTP or FTP traffic, the application blocks access and shows a warning message.
  • For HTTPS traffic, a browser displays an error page.

The table describes all available values and default values of all the settings that you can specify for the Web Threat Protection task.

Web Threat Protection task settings

Setting

Description

Values

ActionOnDetect

Specifies the action to be performed upon detection of an infected object in web traffic.

Notify — Allow the detected object to be downloaded, display a notification about the blocked access attempt, and log information about the infected object.

Block (default value) — Block access to the detected object, display a notification about the blocked access attempt, and log information about the infected object.

CheckMalicious

Specifies whether links will be checked against the database of malicious web addresses.

Yes (default value) — Check if the links are listed in the malicious links database.

No — Do not check if the links are listed in the malicious links database.

CheckPhishing

Specifies whether links will be checked against the database of phishing web addresses.

Yes (default value) — Check if the links are listed in the phishing links database.

No — Do not check if the links are listed in the phishing links database.

UseHeuristicForPhishing

Specifies whether heuristic analysis must be used to scan web pages for phishing links.

Yes (default value) — Use heuristic analysis to detect phishing links. If this value is specified, the level of heuristic analysis is Light (the least thorough scan with minimal load on the system). You cannot change the heuristic analysis level for the Web Threat Protection task.

No — Do not use heuristic analysis to detect phishing links.

CheckAdware

Specifies whether links must be checked against the database of adware web addresses.

Yes — Check if the links are listed in the adware links database.

No (default value) — Do not check if the links are listed in the adware links database.

CheckOther

Specifies whether links must be checked against the database of web addresses that contain legal software that may be used by criminals to damage your device or personal data.

Yes — Check if the links are listed in the database of web addresses that contain legal software that may be used by intruders to damage your device or personal data.

No (default value) — Do not check if the links are listed in the database of web addresses that contain legal software that may be used by intruders to damage your device or personal data.

UseTrustedAddresses

Enables or disables the usage of a list of trusted web addresses. The application does not analyze information from trusted web addresses to check them for viruses or other dangerous objects. You can specify trusted web addresses using the TrustedAddresses.item_# setting.

Yes (default value) — Use a list of trusted web addresses.

No — Do not use a list of trusted web addresses.

TrustedAddresses.item_#

Specifies trusted web addresses.

The default value is not defined.

You can use masks to specify web addresses.

When creating an address mask, use an asterisk (*) as a placeholder for one or more characters. If you enter the *abc* address mask, it is applied to all web resources that contain the "abc" sequence (for example, www.virus.com/download_virus/page_0-9abcdef.html). To include the asterisk in the address mask as a character, but not as a mask, enter the * character twice (for example, www.virus.com/**/page_0-9abcdef.html means www.virus.com/*/page_0-9abcdef.html).

Masks are not supported to specify IP addresses.

Page top

[Topic 233753]

Device Control task (Device_Control, ID:15)

When the Device Control task is running, Kaspersky Endpoint Security manages user access to the devices that are installed on or connected to the client device (for example, hard drives, cameras, or Wi-Fi modules). This lets you protect the client device from infection when external devices are connected, and prevent data loss or leaks.

By default, the Device Control task starts automatically when the application starts. You can stop the task at any moment if necessary.

The Device Control task manages user access to devices using the access rules. You can select the action to be performed by the Device Control task: apply rules or notify about the start of a device that matches a rule.

Device Control task manages user access at the following levels:

  • Device type. For example, printers, removable drives, or CD/DVD drives.
  • Connection bus. Connection bus is an interface used to connect devices to the client device (USB or FireWire).
  • Trusted devices. Trusted devices are devices to which users have full access.

    You can add devices to a list of trusted devices by ID. Each device has a unique DeviceId. You can view the IDs of the connected devices by executing the kesl-control --get-device-list command.

When the task is launched for the first time, the DeviceAllowed event is generated for all detected devices with a known device or bus type. During subsequent launches, duplicate events are not generated for these devices if there have been no changes in the task settings for these devices.

If the Device Control task stops running, the application unblocks access to blocked devices.

In the general application settings, if the InterceptorProtectionMode setting is set to Notify, it is not possible to block access to devices using a device access schedule (the [Schedules.item_#] section).

Kaspersky Endpoint Security ignores the excluded mount points for the Device Control task. The access rules apply to devices mounted in a globally excluded mount point.

In this Help section

About access rules

Device Control task settings

Viewing the list of connected devices on the command line

Page top

[Topic 198019]

About access rules

Device access rule is the setting that determines which users can access devices that are installed on the client device or connected to it, as well as the time when users can access these devices.

For each device type, you can specify the following access modes: Allow, Block, or DependsOnBus. If the DependsOnBus value is specified, access to the device is defined by the connection bus access rule.

For some device types, you can also specify the ByRule access mode, which means that access to the device is determined by a configured access rule. If you try to perform an operation with a device for which the access mode is set to ByRule but there is no rule active at the time of access, the operation will be blocked.

A connection bus access rule allows or blocks access to the connection bus (USB or FireWire). For each connection bus, you can specify the following access modes: Allow or Block. For example, you can allow or block connection of all USB devices. You can also limit access to specific USB devices or only to USB drives; access to other USB devices is denied.

Examples:

To deny access to all USB devices except the specified one, specify the following settings:

In the [DeviceBus] section, specify USB=Block

In the [TrustedDevices.item_#] section, specify DeviceId=<device ID>

To deny access to all USB devices, but allow access to all USB drives, specify the following settings:

In the [DeviceBus] section, specify USB=Block

In the [TrustedDevices.item_#] section, specify DeviceId=USBSTOR*

By default, device access rules are created for all types of devices according to the classification of the Device Control component. Such rules grant users full access to devices if access to the connection buses of the respective device types is allowed.

You can edit device access rules and connection bus access rules.

Page top

[Topic 233755]

Device Control task settings

The table describes all available values and the default values of all the settings that you can specify for the Device Control task.

Device Control task settings

Setting

Description

Values

RulesAction

Action performed by the application upon an attempt to access a device protected by the access rules.

ApplyRules (default value): the Application Control rules are applied and the action specified in the rules is performed.

TestRules: the application tests the rules, allows access, and generates an event about the detection of a device that meets the rule.

The [DeviceClass] section contains access modes for devices depending on their type.

HardDrive

Access mode for the hard drives connected to a client device.

Allow — Users are allowed access to hard drives.

DependsOnBus (default value) — Access to the hard drives depends on the connection bus access rule.

Block — Access to all hard drives (except system hard drives, which are never blocked by the Device Control task) is blocked for users.

ByRule — Access to the hard drives depends on the access rules.

RemovableDrive

Access mode for the removable drives connected to a client device.

Allow — Access to the removable drives is allowed for users.

DependsOnBus (default value) — Access to the removable drives depends on the connection bus access rule.

Block — Access to the removable drives is blocked for users.

ByRule — Access to the removable drives depends on the access rules.

FloppyDrive

Access mode for the floppy disks connected to a client device.

The application does not block floppy disks connected to the client device using the ISA bus.

Allow — Users are allowed access to floppy disks.

DependsOnBus (default value) — Access to floppy disks depends on the connection bus access rule.

Block — Access to floppy disks is blocked for users.

ByRule — Access to floppy disks depends on the access rules.

OpticalDrive

Access mode for the CD/DVD drives connected to a client device.

Allow — Users are allowed access to CD/DVD drives.

DependsOnBus (default value) — Access to CD/DVD drives depends on the connection bus access rule.

Block — Access to CD/DVD drives is blocked for users.

ByRule — Access to CD/DVD drives depends on the access rules.

SerialPortDevice

Access mode for the devices connected to a client device via a serial port.

The application does not block the devices connected to a client device via a serial port using the ISA bus.

Allow — Users are allowed access to devices connected through a serial port.

DependsOnBus (default value) — Access to devices connected through a serial port depends on the connection bus access rule.

Block — Access to devices connected through a serial port is blocked for users.

ParallelPortDevice

Access mode for the devices connected to a client device via a parallel port.

Allow — Users are allowed access to devices connected through a parallel port.

DependsOnBus (default value) — Access to devices connected through a parallel port depends on the connection bus access rule.

Block — Access to devices connected through a parallel port is blocked for users.

Printer

Access mode for the printers connected to a client device.

Allow — Users are allowed access to printers.

DependsOnBus (default value) — Access to printers depends on the connection bus access rule.

Block — Access to printers is blocked for users.

Modem

Access mode for the modems connected to a client device.

Allow — Users are allowed access to modems.

DependsOnBus (default value) — Access to modems depends on the connection bus access rule.

Block — Access to modems is blocked for users.

TapeDrive

Access mode for the tape devices connected to a client device.

Allow — Users are allowed access to tape devices.

DependsOnBus (default value) — Access to tape devices depends on the connection bus access rule.

Block — Access to tape devices is blocked for users.

MultifuncDevice

Access mode for the multifunctional devices connected to a client device.

Allow — Users are allowed access to multifunctional devices.

DependsOnBus (default value) — Access to multifunctional devices depends on the connection bus access rule.

Block — Access to multifunctional devices is blocked for users.

SmartCardReader

Access mode for the smart card readers connected to a client device.

Allow — Access to smart card readers is allowed for users.

DependsOnBus (default value) — Access to smart card readers depends on the connection bus access rule.

Block — Access to smart card readers is blocked for users.

WiFiAdapter

Access mode for the Wi-Fi adapters connected to a client device.

Allow — Users are allowed access to Wi-Fi adapters.

DependsOnBus (default value) — Access to Wi-Fi adapters depends on the connection bus access rule.

Block — Access to the Wi-Fi adapters is blocked for users.

NetworkAdapter

Access mode for the external network adapters connected to a client device.

Allow — Users are allowed access to external network adapters.

DependsOnBus (default value) — Access to external network adapters depends on the connection bus access rule.

Device Control does not allow denying access to external network adapters in order to avoid disconnecting the client device from the network.

PortableDevice

Access mode for the portable devices connected to a client device.

Allow — Users are allowed access to portable devices.

DependsOnBus (default value) — Access to portable devices depends on the connection bus access rule.

Block — Access to portable devices is blocked for users.

BluetoothDevice

Access mode for the Bluetooth devices connected to a client device.

Allow — Users are allowed access to Bluetooth devices.

DependsOnBus (default value) — Access to Bluetooth devices depends on the connection bus access rule.

Block — Access to Bluetooth devices is blocked for users.

ImagingDevice

Access mode for the imaging devices connected to a client device.

Allow—Access to all imaging devices is allowed for users.

DependsOnBus (default value) — Access to imaging devices depends on the connection bus access rule.

Block—Access to all imaging devices is blocked for users.

SoundAdapter

Access mode for the sound adapters connected to a client device.

Allow—Access to all sound adapters is allowed for users.

DependsOnBus (default value) — Access to sound adapters depends on the connection bus access rule.

Block—Access to all sound adapters is blocked for users.

InputDevice

Access mode for the input devices (keyboards, mouse, touchpad, and others) connected to a client device.

Allow — Users are allowed access to input devices.

DependsOnBus (default value) — Access to input devices depends on the connection bus access rule.

Block — Access to input devices is blocked for users.

The [DeviceBus] section contains connection bus access rules that determine whether the connection of devices is allowed or blocked.

USB

Connection bus access rules for the devices connected to a client device via USB interface.

Allow (default value) — Users are allowed access to USB-devices.

Block — Access to USB-devices is blocked for users.

FireWire

Connection bus access rules for the devices connected to a client device via FireWire interface.

Allow (default value) — Users are allowed access to devices connected via the FireWire interface.

Block — Access to devices connected via the FireWire interface is blocked for users.

The [TrustedDevices.item_ #] section contains trusted devices.

DeviceId

Specifies ID or ID mask of a trusted device.

You can use the masks * (any sequence of characters) or ? (any single character) to indicate the device ID.

Comment

Comment to the specified trusted device.

The [Schedules.item_#] section contains the device access schedule. You can configure a schedule only for hard drives, removable drives, floppy disks, and CD/DVD drives.

ScheduleName

Specifies a schedule name.

The schedule name must be unique.

The default value: Default.

The Default schedule provides users full access to devices at any time if the connection bus is allowed to access the corresponding device type.

You cannot delete the Default schedule.

DaysHours

Specifies time intervals for a schedule.

All (default value) — The schedule is valid 24/7 (no time limitation).

<week_day> — Days of the week. You can use either the full week day names or abbreviations (for example, for Monday, you can specify Mo, or Mon, or Monday). For week days, you can specify intervals or specific days. The week starts from Sunday.

<hour> — Hours [0:24]. You can specify only intervals for hours.

Examples:

Schedule_1 is valid from Sunday till Saturday from 0 a.m. to 11 a.m., from 12 p.m. to 3 p.m., and from 4 p.m. to 12 a.m.:

[Schedules.item_0001]

ScheduleName=schedule_1

DaysHours=Su-Sa:0..11,12..15,16..24

Schedule_2 is valid for the following intervals: on Thursdays from 12 p.m. to 2 p.m. and on Fridays from 2 a.m. to 3 p.m. and from 4 p.m. to 12 a.m.:

[Schedules.item_0002]

ScheduleName=schedule_2

DaysHours=Th:12..14;Fr:2..15,16..24

Schedule_3 is valid 24 hours 7 days a week:

[Schedules.item_0003]

ScheduleName=schedule_3

DaysHours=All

 

The [HardDrivePrincipals.item_#] section contains hard drive access rules.

For hard drives, at least one schedule must always be enabled. You can assign several access rules to a hard drive. Also, multiple schedules can be specified for a user or group of users. If an access rule conflict occurs for a user or group, the minimum access rights are granted.

Principal

Specifies a user or group of users for whom the access rule is applied.

\Everyone (default value) — The access rule applies to all users.

<user name> — Name of the user to whom the access rule applies.

@<group name> — Name of the group of users to whom the access rule applies.

[HardDrivePrincipals.item_#.AccessRules.item_#]

Access rule settings.

UseRule

Specifies whether the rule is enabled or disabled.

Yes (default value) — The access rule is enabled.

No — The access rule is disabled.

ScheduleName

Schedule specified in the [Schedules.item_#] section.

The default value: Default.

Access

Specifies access type.

Allow (default value) — Access to hard drives is allowed.

Block — Access to hard drives is blocked.

The [RemovableDrivePrincipals.item_#] section contains the access rules for removable drives.

For removable drives, at least one schedule must always be enabled. You can assign several access rules to a removable drive. Also, multiple schedules can be specified for a user or group of users. If an access rule conflict occurs for a user or group, the minimum access rights are granted.

Principal

Specifies a user or group of users for whom the access rule is applied.

\Everyone (default value) — The access rule applies to all users.

<user name> — Name of the user to whom the access rule applies.

@<group name> — Name of the group of users to whom the access rule applies.

[RemovableDrivePrincipals.item_#.AccessRules.item_#]

Access rule settings.

UseRule

Specifies whether the rule is enabled or disabled.

Yes (default value) — The access rule is enabled.

No — The access rule is disabled.

ScheduleName

Schedule specified in the [Schedules.item_#] section.

The default value: Default.

Access

Specifies access type.

Allow (default value) — Access to removable drives is allowed.

Block — Access to removable drives is blocked.

The [FloppyDrivePrincipals.item_#] section contains access rules for floppy drives.

For floppy drives, at least one schedule must always be enabled. You can assign several access rules to a floppy drive. Also, multiple schedules can be specified for a user or group of users. If an access rule conflict occurs for a user or group, the minimum access rights are granted.

Principal

Specifies a user or group of users for whom the access rule is applied.

\Everyone (default value) — The access rule applies to all users.

<user name> — Name of the user to whom the access rule applies.

@<group name> — Name of the group of users to whom the access rule applies.

[FloppyDrivePrincipals.item_#.AccessRules.item_#]

Access rule settings.

UseRule

Specifies whether the rule is enabled or disabled.

Yes (default value) — The access rule is enabled.

No — The access rule is disabled.

ScheduleName

Schedule specified in the [Schedules.item_#] section.

The default value: Default.

Access

Specifies access type.

Allow (default value) — Access to floppy drives is allowed.

Block — Access to floppy drives is blocked.

The [OpticalDrivePrincipals.item_#] section contains the access rules for CD/DVD drives.

For CD/DVD drives, at least one schedule must always be enabled. You can assign several access rules to a CD/DVD drive. Also, multiple schedules can be specified for a user or group of users. If an access rule conflict occurs for a user or group, the minimum access rights are granted.

Principal

Specifies a user or group of users for whom the access rule is applied.

\Everyone (default value) — The access rule applies to all users.

<user name> — Name of the user to whom the access rule applies.

@<group name> — Name of the group of users to whom the access rule applies.

[OpticalDrivePrincipals.item_#.AccessRules.item_#]

Access rule settings.

UseRule

Specifies whether the rule is enabled or disabled.

Yes (default value) — The access rule is enabled.

No — The access rule is disabled.

ScheduleName

Schedule specified in the [Schedules.item_#] section.

The default value: Default.

Access

Specifies access type.

Allow (default value) — Access to CD/DVD drives is allowed.

Block — Access to CD/DVD drives is blocked.

Page top

[Topic 198021]

Viewing the list of connected devices on the command line

Only users with the admin and audit roles can view the list of connected devices.

To view the list of connected devices, execute the following command:

kesl-control [-D] --get-device-list

Kaspersky Endpoint Security displays the following information about connected devices:

  • Device type. Type of the connected device. For example, OpticalDrive or HardDrive.
  • Identifier. ID of the connected device.
  • Name. Name of the connected device.
  • Path. Path to the device in the sysfs virtual operating system.
  • System drive. The setting indicates whether the connected device is a system drive (Yes or No).
  • Bus. Connection bus. Possible values: UnknownBus, USB, FireWire.
  • Driver. Name of the driver read by the sysfs virtual operating system.

Page top

[Topic 198022]

Removable Drives Scan task (Removable_Drives_Scan, ID:16)

When the Removable Drives Scan task is working, the application scans the connected device and its boot sectors for viruses and other malware. The following removable drives are scanned: CDs, DVDs, Blu-ray discs, flash drives (including USB modems), external hard drives, and floppy disks.

When the Removable Drives Scan task is running, the application monitors connection of removable drives to the device. When a removable drive is connected, the application creates and starts the temporary Scan_Boot_Sectors task of the ODS type with the following setting: ScanBootSectors=yes. This task cannot be stopped. After the task execution completes, the application automatically deletes the task.

If file scan is configured, the application also starts one or several custom Scan_File tasks of the ODS type with the following setting: ScanFiles=yes. If necessary, a user with administrator privileges can stop this task.

If you change the Removable Drives Scan task settings, the new values are not applied to the already running Scan_Boot_Sectors and Scan_File tasks. Stopping the Removable Drives Scan task does not stop the Scan_Boot_Sectors and Scan_File tasks that are already running.

Removable Drives Scan is stopped by default. You can start or stop the task at any moment if necessary.

The table describes all available values and the default values of all the settings that you can specify for the Removable Drives Scan task.

Removable Drives Scan task settings

Setting

Description

Values

ScanRemovableDrives

Enables the scanning of removable drives when they are connected to the device.

This setting does not apply to CD/DVD drives and Blu-ray discs (see the description of the ScanOpticalDrives setting).

DetailedScan — Scan all files on removable drives (except CD/DVD drives and Blu-ray discs). For a detailed scan, the default settings of the Custom Scan task are used.

QuickScan — Scan only files of specific types on removable drives (except CD/DVD drives and Blu-ray discs). For a quick scan, the default settings of the File Threat Protection task are used.

The following file formats are scanned on removable media: com, exe, sys, prg, bin, bat, cmd, dpl, dll, scr, cpl, ocx, tsp, drv, vxd, pif, lnk, reg, ini, cia, vbs, vbe, js, jse, htm, htt, hta, asp, chm, pht, wsh, wsf, the, hip, eml, nws, msg, pig, mbx, doc*, dot*, fpm, rtf, shs, dwg, msi, otm, pdf, swf, jpeg, emf, ico, ov?, xl*, xlsb, pp*, md*, sldx, sldm, thmx.

NoScan (default value) — Do not scan removable media when it is connected to the device.

ScanOpticalDrives

Enables the scanning of CD/DVD drives and Blu-ray discs when they are connected to the device.

DetailedScan — Scan all files on CD/DVD drives and Blu-ray discs. For a detailed scan, the default settings of the Custom Scan task are used.

QuickScan — Scan only specific types of files on CD/DVD drives and Blu-ray discs. For a quick scan, the default settings of the File Threat Protection task are used.

The following file formats are scanned on removable media: com, exe, sys, prg, bin, bat, cmd, dpl, dll, scr, cpl, ocx, tsp, drv, vxd, pif, lnk, reg, ini, cia, vbs, vbe, js, jse, htm, htt, hta, asp, chm, pht, wsh, wsf, the, hip, eml, nws, msg, pig, mbx, doc*, dot*, fpm, rtf, shs, dwg, msi, otm, pdf, swf, jpeg, emf, ico, ov?, xl*, xlsb, pp*, md*, sldx, sldm, thmx.

NoScan (default value) — Do not scan CD/DVD drives and Blu-ray discs when they are connected.

BlockDuringScan

Enables the blocking of files on a connected disk during scanning. While scanning boot sectors, files are not blocked.

Yes — Block files during the scan.

No (default value) — Do not block files during the scan.

Page top

[Topic 234168]

Network Threat Protection task (Network_Threat_Protection, ID:17)

While the Network Threat Protection task is running, the application scans inbound network traffic for activity that is typical for network attacks. Kaspersky Endpoint Security receives TCP port numbers from the current application databases and scans incoming traffic for these ports. When the task starts, the current connections for intercepted TCP ports are reset.

To scan network traffic, the Network Threat Protection task receives port numbers from the application databases and accepts connections via all these ports. During the network scan process, it may look like an open port on the device, even if no application on the system is listening to this port. It is recommended to close unused ports by means of a firewall.

Upon detecting an attempted network attack that targets your device, the application blocks network activity from the attacking device and logs a corresponding event. The application blocks network traffic from the attacking device for one hour. You can change the block duration in the task settings. You can view the list of devices blocked by the Network Threat Protection task using the --get-blocked-hosts command and manually unblock these devices using the --allow-hosts command.

Kaspersky Endpoint Security adds a special chain of allowing rules (kesl_bypass) to the list in the mangle table of the iptables and ip6tables utilities. This chain of allowing rules makes it possible to exclude traffic from scans by the application. If traffic exclusion rules are configured in the chain, they affect the operation of the Network Threat Protection task. For example, to exclude outgoing HTTP traffic, you need to add the following command: iptables -t mangle -I kesl_bypass -m tcp -p tcp --dport http -j ACCEPT.

The table describes all available values and the default values of all the settings that you can specify for the Network Threat Protection task.

Network Threat Protection task settings

Setting

Description

Values

ActionOnDetect

Actions performed upon detection of network activity that is typical of network attacks.

Changing the value of this setting from Block to Notify clears the list of blocked devices.

Notify – allow network activity, log information about detected network activity. If this value is specified, the value of the BlockAttackingHosts parameter is ignored.

Block (default value) – block network activity and log information about it.

BlockAttackingHosts

Blocking network activity from attacking devices.

Yes (default value) — Block network activity of an attacking device.

No – Do not block network activity of the attacking device. If this value is specified and the ActionOnDetect parameter is set to Block, the application blocks network activity from the attacking device, but does not add the device to the list of blocked devices.

BlockDurationMinutes

Specifies how long attacking devices will be blocked (in minutes).

1 – 32768

Default value: 60.

UseExcludeIPs

The usage of a list of IP addresses whose network activity will not be blocked when a network attack is detected. The application will only log information about dangerous activity from these devices.

You can add IP addresses to the exclusion list by using the ExcludeIPs.item_# setting. By default, the list is empty.

Yes — Use the list of excluded IP addresses.

No (default value) — Do not use the list of excluded IP addresses.

ExcludeIPs.item_#

Specifies an IP address whose network activity will not be blocked by the application.

d.d.d.d — IPv4 address, where d is a decimal number from 0 to 255.

d.d.d.d/p — Subnet of IPv4 addresses, where p is a number from 0 to 32.

x:x:x:x:x:x:x:x — IPv6 address, where x is a hexadecimal number from 0 to ffff.

x:x:x:x::0/p — Subnet of IPv6 addresses, where p is a number from 0 to 64.

The default value is not defined.

Page top

[Topic 198028]

Container Scan task (Container_Scan, ID:18)

When the Container Scan task is running, Kaspersky Endpoint Security scans containers and images for viruses and other malware. You can run multiple Container Scan tasks simultaneously.

Integration with Docker container management system, CRI-O framework, and Podman and runc utilities is supported.

To use the task, a license that includes the corresponding function is required.

In this Help section

Container scan task settings

Integration with Jenkins

Page top

[Topic 198030]

Container scan task settings

The table describes all available values and the default values of all the container and image scan settings.

Container scan task settings

Setting

Description

Values

ScanContainers

Scan of containers specified by mask You can specify masks using the ContainerNameMask setting.

Yes (default value) — Scan containers defined by mask.

No — Do not scan containers defined by mask.

ContainerNameMask

Specifies a name or a name mask that defines a container to scan.

Masks are specified in command shell format. You can use the ? and * symbols.

Before specifying this setting, make sure that ScanContainers=Yes.

Default value: * (scan all containers).

Examples:

Scan a container with my_container name:

ContainerNameMask=my_container

Scan all containers whose names start with my_container:

ContainerNameMask=my_container*

Scan all containers whose names start with my_, then contain any five characters, then _container, and end with any characters sequence:

ContainerNameMask=my_?????_container*

 

ScanImages

Scan of images specified by mask You can specify masks using the ImageNameMask setting.

Yes (default value) — Scan images defined by mask.

No — Do not scan images defined by mask.

ImageNameMask

Specifies a name or a name mask that define images to scan.

Before specifying this setting, make sure that the ScanImages setting is set to Yes.

Masks are specified in command shell format.

If you want to specify several masks, each mask must be specified on a new line with a new index.

Default value: * (scan all images).

Examples:

Scan images with the "my_image" name, and the "latest" tag:

ImageNameMask=my_image:latest

Scan all images whose names start with my_image_ and with any tag:

ImageNameMask=my_image*

 

DeepScan

Checking all image layers and running containers.

Yes – Scan all layers.

No (default value) – Do not scan any layer.

ContainerScanAction

Action to be performed on a container when an infected object is detected. Actions on an infected object inside the container are described below.

StopContainerIfFailed (default value) — The application stops the container if an infected object could not be disinfected or deleted.

Due to the way a CRI-O environment works, an infected object is not disinfected or deleted in a container in a CRI-O environment. We recommend to select the StopContainer action.

StopContainer — The application stops the container when an infected object is detected.

Skip — The application does not perform any action on containers when an infected object is detected.

ImageAction

Specifies the action to be performed on an image when an infected object is detected. Actions on an infected object inside the image are described below.

Skip (default value) — The application does not perform any action on images when an infected object is detected.

Delete — The application deletes the image when an infected object is detected (not recommended).

All dependencies will also be deleted. Running containers will be stopped, and then deleted.

The settings described below are applied to the objects inside containers and images.

Container scan task settings

Setting

Description

Values

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes (default value) — Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes (default value) — Scan self-extracting archives.

No — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

TimeLimit

Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 0.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, Kaspersky Endpoint Security immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Skip — The application does not try to disinfect or delete infected objects. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Skip or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified the second action, the application applies Skip as the second action.

Default value: Skip.

UseExcludeMasks

Uses scan exclusions for the objects specified by the ExcludeMasks.item_# setting.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from scans.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Uses scan exclusions for objects containing the threats specified by the ExcludeThreats.item_# setting.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from scans.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

Page top

[Topic 198031]

Integration with Jenkins

Kaspersky Endpoint Security supports integration with Jenkins. Jenkins Pipeline plug-ins can be used to scan Docker images at different stages. For example, you can scan Docker images in a repository during the development process or before publishing.

To integrate Kaspersky Endpoint Security with Jenkins:

  1. Install Kaspersky Endpoint Security on a Jenkins node.
  2. Install Docker Engine on a Jenkins node.

    For details, please refer to the Docker Engine documentation.

  3. Grant the Kaspersky Endpoint Security administrator privileges to the Jenkins user:

    kesl-control --grant-role admin <Jenkins user name>

  4. Add a Jenkins user to the docker group:

    sudo usermod -aG docker <Jenkins user name>

    Usually the jenkins name is used.

  5. In Jenkins, create a new build job with the test name (New ItemEnter an item name).

    jenkins_create_job

  6. Configure your project, according to your needs. It is assumed that as a result, you have an image or a started container that you need to scan.
  7. To start the Docker container, add the following script to the Jenkins build procedure. If you use Jenkins plug-ins or another way to start Docker containers, save the ID of the running Docker container to the file /tmp/kesl_cs_info, for further scanning:

    TMP_FILE="/tmp/kesl_cs_info"

    EXIT_CODE=0

    echo "Start container from image: '${TEST_CONTAINER_IMAGE}'"

    CONTAINER_ID=$(docker run -d -v /storage:/storage ${TEST_CONTAINER_IMAGE} /storage/docker_process.sh)

    if [ -z "${CONTAINER_ID}" ] ; then

    echo "Cannot start container from image ${TEST_CONTAINER_IMAGE}"

    exit 1

    fi

    echo "${CONTAINER_ID}" > ${TMP_FILE}

    exit ${EXIT_CODE}

    jenkins_contianer_name

  8. After building the artifacts, add the following script to the steps to build the jenkins.

    This script supports one container for scanning. If necessary, modify the script according to your needs.

    TMP_FILE="/tmp/kesl_cs_info"

    EXIT_CODE=0

    if [ ! -f "${TMP_FILE}" ] ; then

    echo "Cannot find temporary file with container ID: '${TMP_FILE}'"

    exit 1

    fi

    CONTAINER_ID=$(cat ${TMP_FILE})

    if [ -z "${CONTAINER_ID}" ] ; then

    echo "Cannot find container ID in the temporary file: '${TMP_FILE}'"

    exit 1

    fi

    echo "Start anti-virus scan for: '${CONTAINER_ID}'"

    THREATS_AMOUNT=$(kesl-control --scan-container ${CONTAINER_ID}|grep 'Total detected objects'|awk '{print $5}')

    if [ "${THREATS_AMOUNT}" != "0" ] ; then

    echo "ATTENTION! ${THREATS_AMOUNT} threats detected at: '${CONTAINER_ID}'"

    EXIT_CODE=1

    else

    echo "Not threats found"

    fi

    echo "Remove container: {${CONTAINER_ID}}"

    docker kill ${CONTAINER_ID}

    docker rm -f ${CONTAINER_ID}

    rm -f ${TMP_FILE}

  9. To scan a Docker image from a repository, use the following script:

    DOCKER_FILE=https://raw.githubusercontent.com/ianmiell/simple-dockerfile/master/Dockerfile

    DOCKER_FILE_FETCHED=$$.Dockerfile

    TEST_IMAGE_NAME=test_image

    echo "Build image from ${DOCKER_FILE}"

    curl ${DOCKER_FILE} -o ${DOCKER_FILE_FETCHED}

    if [ -f ${DOCKER_FILE_FETCHED} ] ; then

    echo "Dockerfile fetched: ${DOCKER_FILE_FETCHED}"

    else

    echo "Dockerfile not fetched"

    exit 1

    fi

    docker build -f ${DOCKER_FILE_FETCHED} -t ${TEST_IMAGE_NAME}

    echo "Scan docker image"

    SCAN_RESULT=$(/opt/kaspersky/kesl/bin/kesl-control --scan-container ${TEST_IMAGE_NAME}*)

    echo "Scan done: "

    echo $SCAN_RESULT

  10. Save the build job.
Page top

[Topic 201799]

Custom Container Scan task (Custom_Container_Scan, ID:19)

The Custom Container Scan task is used to store the setting values that are applied by executing the kesl-control --scan-container command.

To use the task, a license that includes the corresponding function is required.

When the Custom Container Scan task is run, the application creates a temporary Container Scan task (ContainerScan type) with the Custom_Container_Scan task settings. You can change the setting values of the Custom_Container_Scan task using the command line. After the scan is complete, the Custom_Container_Scan task is automatically deleted. The Custom Container Scan task cannot be deleted manually.

To start the Custom Container Scan task, execute the following command:

kesl-control --scan-container <container ID or image ID|container name|image name[:tag]>

If there are several entities with the same name, the application scans all of them.

You can use masks to scan several objects.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

When you create a Custom Container Scan task by executing the kesl-control --create-task <task name> --type ContainerScan command, the application uses the same setting values as for the Container Scan (Container_Scan) task.

Examples:

Scan the container named my_container:

kesl-control --scan-container my_container

Scan the image named my_image (all tags):

kesl-control --scan-container my_image*

The table describes all available values and the default values of all the container and image scan settings.

Custom Container Scan task settings

Setting

Description

Values

ScanContainers

Scan of containers specified by mask You can specify masks using the ContainerNameMask setting.

Yes (default value) — Scan containers defined by mask.

No — Do not scan containers defined by mask.

ContainerNameMask

Specifies a name or a name mask that defines a container to scan.

Masks are specified in command shell format. You can use the ? and * symbols.

Before specifying this setting, make sure that ScanContainers=Yes.

Default value: * (scan all containers).

Examples:

Scan a container with my_container name:

ContainerNameMask=my_container

Scan all containers whose names start with my_container:

ContainerNameMask=my_container*

Scan all containers whose names start with my_, then contain any five characters, then _container, and end with any characters sequence:

ContainerNameMask=my_?????_container*

 

ScanImages

Scan of images specified by mask You can specify masks using the ImageNameMask setting.

Yes (default value) — Scan images defined by mask.

No — Do not scan images defined by mask.

ImageNameMask

Specifies a name or a name mask that define images to scan.

Before specifying this setting, make sure that the ScanImages setting is set to Yes.

Masks are specified in command shell format.

If you want to specify several masks, each mask must be specified on a new line with a new index.

Default value: * (scan all images).

Examples:

Scan images with the "my_image" name, and the "latest" tag:

ImageNameMask=my_image:latest

Scan all images whose names start with my_image and with any tag:

ImageNameMask=my_image*

 

DeepScan

Checking all image layers and running containers.

Yes – Scan all layers.

No (default value) – Do not scan any layer.

ContainerScanAction

Action to be performed on a container when an infected object is detected. Actions on an infected object inside the container are described below.

StopContainerIfFailed (default value) — The application stops the container if an infected object could not be disinfected or deleted.

Due to the way a CRI-O environment works, an infected object is not disinfected or deleted in a container in a CRI-O environment. We recommend to select the StopContainer action.

StopContainer — The application stops the container when an infected object is detected.

Skip — The application does not perform any action on containers when an infected object is detected.

ImageAction

Specifies the action to be performed on an image when an infected object is detected. Actions on an infected object inside the image are described below.

Skip (default value) — The application does not perform any action on images when an infected object is detected.

Delete — The application deletes the image when an infected object is detected (not recommended).

All dependencies will also be deleted. Running containers will be stopped, and then deleted.

The settings described below are applied to the objects inside containers and images.

Custom Container Scan task settings

Setting

Description

Values

ScanArchived

Enables scanning of archives (including SFX self-extracting archives).

The application scans the following archives: .zip; .7z*; .7-z; .rar; .iso; .cab; .jar; .bz; .bz2; .tbz; .tbz2; .gz; .tgz; .arj. The list of supported archive formats depends on the application databases being used.

Yes (default value) — Scan archives. If the FirstAction=Recommended value is specified, then, depending on the archive type, the application deletes either the infected object or the entire archive that contains the threat.

No — Do not scan archives.

ScanSfxArchived

Enables scanning of self-extracting archives only (archives that contain an executable extraction module).

Yes (default value) — Scan self-extracting archives.

No — Do not scan self-extracting archives.

ScanMailBases

Enables scanning email databases of Microsoft Outlook, Outlook Express, The Bat, and other mail clients.

Yes — Scan files of email databases.

No (default value) — Do not scan files of email databases.

ScanPlainMail

Enables scanning of plain text email messages.

Yes — Scan plain text email messages.

No (default value) — Do not scan plain text email messages.

TimeLimit

Maximum object scan duration (in seconds). The application stops scanning the object if it takes longer than the time specified by this setting.

0–9999

0 — The object scan time is unlimited.

Default value: 0.

SizeLimit

Maximum size of an object to be scanned (in megabytes). If the object to be scanned is larger than the specified value, the application skips this object.

0–999999

0 — The application scans objects of any size.

Default value: 0.

FirstAction

Selection of the first action to be performed by the application on the infected objects.

Disinfect — The application tries to disinfect an object and save a copy of it to the Storage. If disinfection fails (for example, if the type of object or the type of threat in the object cannot be disinfected), then the application leaves the object unchanged. If the first action is Disinfect, it is recommended to specify a second action using the SecondAction setting.

Remove — The application removes the infected object after creating a backup copy of it.

Recommended (perform recommended action) — The application automatically selects and performs an action on the object based on information about the threat detected in the object. For example, the application immediately removes Trojans since they do not incorporate themselves into other files and therefore they do not need to be disinfected.

Skip — The application does not try to disinfect or delete infected objects. Information about the infected object is logged.

Default value: Recommended.

SecondAction

Selection of the second action to be performed by the application on the infected objects. The application performs the second action if the first action fails.

The possible values of the SecondAction setting are the same as those of the FirstAction setting.

If Skip or Remove is selected as the first action, the second action does not need to be specified. It is recommended to specify two actions in all other cases. If you have not specified the second action, the application applies Skip as the second action.

Default value: Skip.

UseExcludeMasks

Uses scan exclusions for the objects specified by the ExcludeMasks.item_# setting.

Yes — Exclude objects specified by the ExcludeMasks.item_# setting from scans.

No (default value) — Do not exclude objects specified by the ExcludeMasks.item_# setting from the scan.

ExcludeMasks.item_#

Excludes objects from being scanned by name or mask. You can use this setting to exclude an individual file from the specified scan scope by name or exclude several files at once using masks in the shell format.

The default value is not defined.

Example:

UseExcludeMasks=Yes

ExcludeMasks.item_0000=eicar1.*

ExcludeMasks.item_0001=eicar2.*

 

UseExcludeThreats

Uses scan exclusions for objects containing the threats specified by the ExcludeThreats.item_# setting.

Yes — Exclude objects containing the threats specified by the ExcludeThreats.item_# setting from scans.

No (default value): do not exclude objects containing the threats specified by the ExcludeThreats.item_# setting from the scan.

ExcludeThreats.item_#

Excludes objects from scans by the name of the threats detected in them. Before specifying a value for this setting, make sure that the UseExcludeThreats setting is enabled.

In order to exclude an object from scans, specify the full name of the threat detected in this object – the string containing the application's decision that the object is infected.

For example, you may be using a utility to collect information about your network. To keep the application from blocking it, add the full name of the threat contained in it to the list of threats excluded from scans.

You can find the full name of the threat detected in an object in the application log or on the website https://threats.kaspersky.com.

The setting value is case-sensitive.

The default value is not defined.

Example:

UseExcludeThreats=Yes

ExcludeThreats.item_0000=EICAR-Test-*

ExcludeThreats.item_0001=?rojan.Linux

 

 

ReportCleanObjects

Enables logging of information about scanned objects that the application reports as not being infected.

You can enable this setting, for example, to make sure that a particular object was scanned by the application.

Yes — Log information about non-infected objects.

No (default value) — Do not log information about non-infected objects.

ReportPackedObjects

Enables logging of information about scanned objects that are part of compound objects.

You can enable this setting, for example, to make sure that an object within an archive has been scanned by the application.

Yes — Log information about scanned objects within archives.

No (default value) — Do not log information about scanned objects within archives.

ReportUnprocessedObjects

Enables logging of information about objects that have not been processed for some reason.

Yes — Log information about unprocessed objects.

No (default value) — Do not log information about unprocessed objects.

UseAnalyzer

Enables heuristic analysis.

Heuristic analysis helps the application to detect threats even before they become known to virus analysts.

Yes (default value) — Enable Heuristic Analyzer.

No — Disable Heuristic Analyzer.

HeuristicLevel

Specifies the heuristic analysis level.

You can specify the heuristic analysis level. The heuristic analysis level sets the balance between the thoroughness of searches for threats, the load on the operating system's resources, and the scan duration. The higher the heuristic analysis level, the more resources and time are required for scanning.

Light — The least thorough scan with minimum load on the system.

Medium — A medium heuristic analysis level with a balanced load on the system.

Deep — The most thorough scan with maximum load on the system.

Recommended (default value) — The recommended value.

UseIChecker

Enables usage of the iChecker technology.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Yes (default value) — Enable use of the iChecker technology.

No — Disable use of the iChecker technology.

Page top

[Topic 234873]

Behavior Detection task (Behavior_Detection, ID:20)

The Behavior Detection task monitors malicious activity by applications in the operating system. When malicious activity is detected, Kaspersky Endpoint Security can terminate the process of the application that performs malicious activity.

If integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response is enabled, exclusions by process are not applied.

By default, the Behavior Detection task starts automatically when the application starts. You can stop the task at any moment if necessary.

Behavior Detection task setting

Setting

Description

Values

TaskMode

Action performed by the application when malicious activity is detected in the operating system.

Block (default value) – terminate the process of the application performing malicious activity.

Notify – do not terminate the process performing malicious activity; only log detection of malicious activity in the event log.

UseTrustedPrograms

Excluding processes from scans.

Yes – do not scan the activity of the indicated processes.

No (default value) – scan all processes.

If integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response is enabled, exclusions by process are not applied.

The [TrustedPrograms.item_#] section contains processes that are excluded from scans. Kaspersky Endpoint Security does not monitor the activity of the specified processes.

ProgramPath

Path to excluded process.

<full path to process> – Do not scan the process in the indicated local directory. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

ApplyToDescendants

Exclude child processes of the excluded process specified by the ProgramPath setting from scans.

Yes – exclude the specified process and all its child processes from scans.

No (default value) – exclude only the specified process from scans, do not exclude its child processes from scans.

ProgramDesc

Description of the excluded process.

 

UseTrustedProgram

Enables the exclusion of the specified process from scanning.

Yes (default value) - enable exclusion of the specified process from scanning.

No - do not exclude the specified process from scanning.

Page top

[Topic 245995]

Application Control task (Application_Control, ID:21)

During execution of the Application Control task, Kaspersky Endpoint Security controls the launching of applications on user devices. This helps reduce the risk of device infection by restricting access to applications. Application launching is regulated by Application Control rules.

To use the task, a license that includes the corresponding function is required.

The Application Control task can operate in two modes:

  • Denylist. In this mode Kaspersky Endpoint Security allows all users to launch any applications that are not specified in the Application Control rules. This is the default operation mode of the Application Control task.
  • Allowlist. In this mode Kaspersky Endpoint Security prevents all users from launching any applications that are not specified in the Application Control rules.

Thus, if the Application Control rules are created to the fullest extent possible, Kaspersky Endpoint Security prohibits the launching of all new applications that are not verified by the administrator of the organization's local network, but ensures the performance of the operating system and verified applications that users need to perform their job duties.

The Kaspersky Security Center administrator or a local user with the admin role assigned in the application can use the Application Control task to prohibit or allow processes to run under the root account.

For each mode of the Application Control task, you can create separate rules and select an action that Kaspersky Endpoint Security will perform when it detects an attempt to start an application on a user's device.

If you change the list of allowed applications or prohibit the launch of all applications or applications affecting Kaspersky Endpoint Security's operation, then when modifying the task settings using the configuration file or using the command line, run the --set-settings command with the --accept flag.

Application Control does not control the launch of Snap, Flatpak, or AppImage applications.

Kaspersky Endpoint Security supports the following interpreters: python, perl, bash, ssh.

The Application Control task does not control the launching of scripts from interpreters that are not supported by Kaspersky Endpoint Security, or the launching of scripts that are not passed to the interpreter via the command line. If the interpreter is allowed to launch by the Application Control rules, Kaspersky Endpoint Security does not block the script launched from this interpreter. If the launch of at least one script specified in the interpreter command line is prohibited by the Application Control rules, Kaspersky Endpoint Security blocks all the scripts specified in the interpreter command line. Exclusion: cat script.py | python.

In this Help section

About Application Control rules

Application Control task settings

Viewing the list of created categories

Page top

[Topic 245996]

About Application Control rules

An Application Control rule is a set of settings required for the Application Control task to work:

  • The application belonging to the application category. An application category is a group of applications with common characteristics. For example, a category that includes executable files of installed applications, or a category of applications required for operation, which includes a standard set of applications used by the organization. Each category can only be used in one rule.

    Kaspersky Endpoint Security does not support use of the KL categories of Kaspersky Security Center.

  • Permission or prohibition for selected users and/or user groups to run applications. You can specify a user and/or user group that is allowed or not allowed to run applications of the specified category.
  • Rule triggering condition. A condition is represented by the following correspondence: "condition type – condition criterion – condition value". Based on the rule triggering condition, Kaspersky Endpoint Security applies or does not apply the rule to the application. The rules use inclusive and exclusive conditions:
    • Inclusive conditions. Kaspersky Endpoint Security applies the rule to the application if the application meets at least one inclusive condition.
    • Exclusive conditions. Kaspersky Endpoint Security does not apply the rule to the application if the application meets at least one exclusive condition or does not meet any of the inclusive conditions.

    Rule triggering conditions are created using the following criteria:

    • Name of the application's executable file.
    • Name of the directory with the application's executable file.
    • Hash of the application's executable file. Only SHA-256 is allowed.

    For each criterion used in the condition, a value must be specified.

    You can use masks to specify the names of files and directories.

    You can use the * character (any sequence of characters) or the ? character (any one character) as the file or directory name mask.

    You can put the * character to represent any set of characters (including an empty set) in a file or directory name that includes the / character. For example, /dir/*/file*/ or /dir/file*/.

    You can put a single ? character to represent any one character (including /) in the file or directory name.

    If the settings of the application being launched match the values ​​of the criteria specified in the inclusive condition, the rule is triggered. In this case, Application Control performs the action specified in the rule. If application settings match the values ​​of the criteria specified in the exclusive condition, Application Control does not control the application launch.

    If the name of the application executable file and the executable file directory are specified in the rule triggering conditions (inclusive or exclusive), but no hash (SHA-256) of the application executable file is specified, then a user having sufficient rights can copy the application to a different directory and run it.

For each mode of the Application Control task, you need to create separate rules and select an action that the Application Control task will perform when it detects an attempt to start an application.

The Application Control rules have three operation statuses:

  • Enabled – the rule is enabled, Kaspersky Endpoint Security applies this rule when the Application Control task is running.
  • Disabled – the rule is disabled and is not used when the Application Control task is running.
  • Test – Kaspersky Endpoint Security allows launching applications that meet the rule criteria, but logs information about launches of these applications in the report.

The priority of the rule operation status is higher than the priority of the action specified in the rule.

Page top

[Topic 245998]

Application Control task settings

The table describes all available values and the default values of all the settings that you can specify for the Application Control task.

Application Control task settings

Setting

Description

Values

AppControlMode

 

Application Control task operation mode.

AllowList – Kaspersky Endpoint Security prevents users from launching any applications that are not specified in the Application Control rules.

DenyList (default value) – Kaspersky Endpoint Security allows users to launch any applications that are not specified in the Application Control rules.

AppControlRulesAction

The action that Kaspersky Endpoint Security performs upon detecting an attempt to start an application.

ApplyRules (default value) – Kaspersky Endpoint Security applies Application Control rules and performs the action specified in the rules.

TestRules – Kaspersky Endpoint Security tests the rules and generates an event about the detection of applications that satisfy the rule.

The [Categories.item_#] section contains the following settings:

Name

Name of the created application category to which the rule applies.

 

UseIncludes

Usage of inclusive conditions to trigger the rule.

Yes – apply the rule to the application if the application meets at least one inclusive condition.

No (default value) – do not apply the rule to the application, even if the application meets the inclusive conditions.

IncludeFileNames.item_#

Name of the executable file that triggers the rule.

You can use masks to specify the file name.

You can use the * character (any sequence of characters) or the ? character (any one character) as the file or directory name mask.

You can put the * character to represent any set of characters (including an empty set) in a file or directory name that includes the / character. For example, /dir/*/file*/ or /dir/file*/.

You can put a single ? character to represent any one character (including /) in the file or directory name.

IncludeFolders.item_#

Name of the directory with the application's executable file that triggers the rule.

You can use masks to specify the directory name.

You can use the * character (any sequence of characters) or the ? character (any one character) as the file or directory name mask.

You can put the * character to represent any set of characters (including an empty set) in a file or directory name that includes the / character. For example, /dir/*/file*/ or /dir/file*/.

You can put a single ? character to represent any one character (including /) in the file or directory name.

IncludeHashes.item_#

Hash (SHA-256) of the executable file that triggers the rule.

 

UseExcludes

Usage of excluding conditions to trigger the rule.

Yes – do not apply the rule to the application if the application meets at least one exclusive condition or does not meet any of the inclusive conditions.

No (default value) – apply the rule to the application, even if the application meets at least one exclusive condition.

ExcludeFileNames.item_#

Name of the executable file that triggers the rule.

You can use masks to specify the file name.

You can use the * character (any sequence of characters) or the ? character (any one character) as the file or directory name mask.

You can put the * character to represent any set of characters (including an empty set) in a file or directory name that includes the / character. For example, /dir/*/file*/ or /dir/file*/.

You can put a single ? character to represent any one character (including /) in the file or directory name.

ExcludeFolders.item_#

Name of the directory with the application's executable file that triggers the rule.

You can use masks to specify the directory name.

You can use the * character (any sequence of characters) or the ? character (any one character) as the file or directory name mask.

You can put the * character to represent any set of characters (including an empty set) in a file or directory name that includes the / character. For example, /dir/*/file*/ or /dir/file*/.

You can put a single ? character to represent any one character (including /) in the file or directory name.

ExcludeHashes.item_#

Hash (SHA-256) of the executable file that triggers the rule.

 

The [AllowListRules.item_#] section contains a list of Application Control rules for the AllowList operation mode.

Each [AllowListRules.item_#] section contains the following settings:

Description

Description of the Application Control rule.

 

AppControlRuleStatus

Operation status of the Application Control rule:

On (default value) – the rule is enabled, Kaspersky Endpoint Security applies this rule when the Application Control task is running.

Off – the rule is not used when the Application Control task is running.

Test – Kaspersky Endpoint Security allows applications covered by the rule to be launched, but logs information about the launch of these applications in the report.

Category

Name of the created application category to which the rule applies.

You can specify the "Golden Image" category.

 

The [AllowListRules.item_#.ACL.item_#] section contains a list of users who are allowed or denied to run applications.

Access

Access type assigned to a user or user group.

Allow (default value) — Allow running applications.

Block – Deny running applications.

Principal

User or user group to which the Application Control rule applies.

\Everyone (default value): the rule applies to all users.

<user name>: name of the user to whom the rule applies.

@<group name>: name of the group of users to whom the rule applies.

The [DenyListRules.item_#] section contains a list of Application Control rules for the DenyList operation mode.

Each [DenyListRules.item_#] section contains the following settings:

Description

Description of the Application Control rule.

 

AppControlRuleStatus

Operation status of the Application Control rule:

On (default value) – the rule is enabled, Kaspersky Endpoint Security applies this rule when the Application Control task is running.

Off – the rule is not used when the Application Control task is running.

Test – Kaspersky Endpoint Security allows applications covered by the rule to be launched, but logs information about the launch of these applications in the report.

Category

Name of the created application category to which the rule applies.

You can specify the "Golden Image" list of applications as a category.

 

The [DenyListRules.item_#.ACL.item_#] section contains a list of users who are allowed or denied to run applications.

Access

Access type assigned to a user or user group.

Allow – allow applications to start.

Block (default value) – do not allow applications to start.

Principal

User or user group to which the Application Control rule applies.

\Everyone (default value): the rule applies to all users.

<user name>: name of the user to whom the rule applies.

@<group name>: name of the group of users to whom the rule applies.

Page top

[Topic 245997]

Viewing the list of created categories

You can view the list of created application categories.

The following categories are displayed in the list of created categories:

  • Categories created in Kaspersky Security Center.
  • Categories added in the Application Control task settings using the command line.
  • The GoldenImage category created using the Inventory Scan task (in Kaspersky Security Center or using the command line).

To view the list of created application categories, execute the following command:

kesl-control [-A] --get-categories [--json]

where:

--json – output format for the list of categories. If this parameter is not specified, the output will be an INI file.

Kaspersky Endpoint Security displays the following information about the application category:

  • Unique identifier (GUID) of the category
  • Category name
  • Category description (if any)
  • The list of conditions for including a file or directory with files in a category
  • The list of conditions for excluding a file or directory with files from a category

If in the Application Control task settings, in the [Categories.item_#] section for inclusive or exclusive conditions for triggering a rule, you specify symbolic links to an application file or directory with executable files, then when viewing the list of categories for these conditions, the source path to which the symbolic link points is displayed.

Page top

[Topic 245999]

Inventory Scan task (Inventory_Scan, ID:22)

The Inventory Scan task provides information about all application executable files stored on the user devices. Obtaining information about the applications installed on the devices can be useful, for example, for creating Application Control rules.

To use the task, a license that includes the corresponding function is required.

In this Help section

Inventory task settings

Viewing a list of detected applications

Page top

[Topic 246000]

Inventory task settings

The table describes all available values and the default values of all the settings that you can specify for the Inventory task.

Inventory task settings

Setting

Description

Values

ScanScripts

Enables script scanning.

Yes (default value) — Scan scripts.

No — Do not scan scripts.

ScanBinaries

Enables binary files scanning (elf, java, and pyc).

Yes (default value) — Scan binaries.

No — Do not scan binaries.

ScanAllExecutable

Enables the scanning of files with an executable bit.

Yes (default value) — Scan files with an executable bit.

No — Do not scan files with an executable bit.

CreateGoldenImage

Adds applications detected on the device by the Inventory task to the Golden Image category. If CreateGoldenImage=Yes, then you can use the "Golden Image" application category in the Application Control rules.

Yes – add detected applications to the "Golden Image" application category.

No (default value) – do not add detected applications to the "Golden Image" application category.

The [ScanScope.item_#] section contains the following settings:

AreaDesc

Description of the inventory scope. The maximum length of the string specified using this setting is 4096 characters.

Default value: All objects.

 

UseScanArea

Enables scans of the specified inventory scope. To run the task, enable scans of at least one inventory scope.

Yes (default value) — Scan the specified inventory scope.

No — Do not scan the specified inventory scope.

AreaMask.item_#

Inventory scope limitation. In the inventory scan scope, the application scans only the files that are specified using the masks in the shell format.

If this setting is not specified, the application scans all the objects in the inventory scope. You can specify several values for this setting.

The default value is * (scan all objects).

Path

Path to the directory with objects to be scanned.

<path to local directory> — Scan objects in the specified directory.

Default value: /usr/bin

The [ExcludedFromScanScope.item_#] section contains the following settings:

AreaDesc

Description of the inventory exclusion scope.

The default value is not defined.

UseScanArea

Excludes the specified scope from the inventory.

Yes (default value) — Exclude the specified scope.

No — Do not exclude the specified scope.

AreaMask.item_#

Limiting the inventory exclusion scope using shell masks.

If this setting is not specified, the application excludes all the objects in the inventory scope. You can specify several values for this setting.

Default value: * (exclude all objects)

Path

Path to the directory with objects to be excluded.

<path to local directory> — Exclude objects in the specified directory from scan. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Page top

[Topic 246001]

Viewing a list of detected applications

You can view the list of applications detected on the device by executing the Inventory Scan task. Obtaining information about the applications installed on the devices can be useful, for example, for creating Application Control rules.

To view the list of applications detected on the device, execute the following command:

kesl-control [-A] --get-app-list

Kaspersky Endpoint Security displays the following information about the detected applications:

  • Date and time of inventory. Date and time when the Inventory task was performed
  • Number of applications. The number of applications detected on the device
  • The list of applications containing the following information:
    • Path. Path to the application.
    • Hash. Application hash sum.
    • Type. Application type. For example, Script, Executable.
    • Categories. Categories that the application belongs to (if they were previously created). You can view the list of created application categories using the command kesl-control [-A] --get-categories.

    When you add a new category, its information is not automatically updated in the application list. To update the application list, you need to restart the Inventory task.

Page top

[Topic 245712]

Kaspersky Endpoint Detection and Response (KATA) Integration task (KATAEDR, ID:24)

Kaspersky Endpoint Security is compatible with the Kaspersky Anti Targeted Attack Platform solution, which is designed to protect the IT infrastructure of organizations and promptly detect threats, such as zero-day attacks, targeted attacks, and advanced persistent threats (APT). To read more, check out the Kaspersky Anti Targeted Attack Platform Help.

Kaspersky Endpoint Detection and Response (KATA) is a component of the Kaspersky Anti Targeted Attack Platform solution.

When interacting with Kaspersky Endpoint Detection and Response (KATA), Kaspersky Endpoint Security can:

  • Send data about events on devices (telemetry) to the Kaspersky Anti Targeted Attack Platform server with the Central Node component ("KATA server"). Kaspersky Endpoint Security sends monitoring data on processes, open network connections, and modified files to the KATA server, as well as data on threats detected by the application and data on the results of processing these threats.
  • Perform the following response actions aimed at ensuring protection functions, based on commands received from Kaspersky Anti Targeted Attack Platform:
    • The "Get file" task lets you get files from user devices. For example, you can configure the application to get an event log file generated by a third-party program.
    • The "Delete file" task lets you delete a file from the device.
    • The "Run process" task lets you remotely run files on the device. For example, you can remotely run a utility that creates a device configuration file, and then retrieve the created file using the "Get file" task.

      If SELinux is installed in your operating system in Enforcing mode, starting the Start process task requires additional configuration of SELinux.

    • The "Terminate process" task lets you remotely terminate processes on the device. For example, you can remotely terminate an Internet speed test utility that was launched using the "Run process" task.
    • The IOC Scan task lets you detect indicators of compromise on a device and perform actions to respond to threats. An indicator of compromise (IOC) is a set of data about an object or activity that indicates unauthorized access to a device (compromised data). are used to search for IOCs. The IOC Search task checks for IOC terms (properties of IOC objects, for example, a file hash) only in the operating system's main namespace. The IOC Search task does not calculate the hash of files larger than 200 MB.
    • Network device isolation lets you isolate devices from the network. You can disable network isolation of a device if the connection with the KATA server is lost after enabling network isolation.

Network isolation limitations

When you use network isolation, we strongly recommended that you familiarize yourself with the limitations described below.

For network isolation to work, Kaspersky Endpoint Security must be running. If Kaspersky Endpoint Security malfunctions (and the application is not running), traffic may not be blocked when network isolation is enabled by Kaspersky Anti Targeted Attack Platform.

Transit traffic with network isolation enabled is supported with limitations and may be filtered.

DHCP and DNS are not automatically added to network isolation exceptions, so if the network address of a resource is changed during network isolation, Kaspersky Endpoint Security will not be able to access it. The same applies to the nodes of the fault-tolerant KATA server. We recommend to not change their addresses so that Kaspersky Endpoint Security does not lose contact with them.

The proxy server is also not automatically added to the network isolation exclusions, so you need to add it to the exclusions manually so that Kaspersky Endpoint Security does not lose contact with the KATA server.

Adding a process to network isolation and excluding a process from network isolation by name is not supported.

When using network isolation, we recommend to use a KSN proxy server to interact with Kaspersky Security Network, use Kaspersky Security Center as a proxy server to activate the application, and specify Kaspersky Security Center as the source of database updates. If it is impossible to use Kaspersky Security Center as a proxy server, configure the settings of the required proxy server and add it to the exceptions.

Integration conditions

Kaspersky Endpoint Detection and Response (KATA) Integration task allows you to configure and enable integration of the Kaspersky Endpoint Security application with the Kaspersky Endpoint Detection and Response (KATA) component. You can also manage the integration of Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA) using the Kaspersky Security Center Administration Console and Kaspersky Security Center Web Console.

Managing Kaspersky Endpoint Detection and Response (KATA) Integration settings in Kaspersky Security Center Cloud Console is not supported.

For integration with Kaspersky Endpoint Detection and Response (KATA), the Behavior Detection task must be enabled.

Integration of the Kaspersky Endpoint Security application with Kaspersky Endpoint Security and Response (KATA) is possible only with Behavior Detection enabled. Otherwise, the required telemetry data cannot be transmitted.

For telemetry exclusions to work, integration of Kaspersky Endpoint Security with the Kaspersky Managed Detection and Response solution must be disabled. If integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response is enabled, exclusions by process are not applied.

Kaspersky Endpoint Detection and Response (KATA) can additionally use data received from the following tasks:

  • File Threat Protection.
  • Network Threat Protection.
  • Web Threat Protection.

Securing the connection

When integrated with Kaspersky Endpoint Detection and Response (KATA), devices with Kaspersky Endpoint Security establish secure connections to the KATA server via the HTTPS protocol. To ensure a secure connection, the following certificates issued by the KATA server are used:

  • KATA server certificate. The connection is encrypted using the server's TLS certificate. You can elevate the security of the connection by verifying the server certificate on the Kaspersky Endpoint Security side. To do this, add the integration server certificate before running the Kaspersky Endpoint Detection and Response (KATA) Integration task.
  • Client certificate. This certificate is used for additional protection of the connection using two-way authentication (scanning devices with Kaspersky Endpoint Security KATA server). The same client certificate can be used by multiple devices. By default, the KATA server does not check client certificates, but two-way authentication can be enabled on the Kaspersky Anti Targeted Attack Platform side. In this case, you need to enable two-way authentication in the Kaspersky Endpoint Detection and Response (KATA) Integration task settings and add the client certificate (cryptocontainer with certificate and private key).

Certificates for securing the connection to the KATA server are provided by the Kaspersky Anti Targeted Attack Platform administrator.

A proxy server is used to connect to the KATA server if use of a proxy server is configured in the general application settings of Kaspersky Endpoint Security.

Logging events

If Kaspersky Endpoint Security is integrated with Kaspersky Anti Targeted Attack Platform, a large number of events can be written to the systemd log. If you want to disable the logging of audit events to the systemd log, disable the systemd-journald-audit socket and restart the operating system.

To disable the systemd-journald-audit socket, run the following commands:

systemctl stop systemd-journald-audit.socket

systemctl disable systemd-journald-audit.socket

systemctl mask systemd-journald-audit.socket

In this Help section

Kaspersky Endpoint Detection and Response (KATA) Integration task settings

Managing certificates for connecting to KATA servers

Page top

[Topic 245753]

Kaspersky Endpoint Detection and Response (KATA) Integration task settings

The table describes all available settings and the default values of all the settings that you can specify for the Kaspersky Endpoint Detection and Response (KATA) Integration task.

Kaspersky Endpoint Detection and Response (KATA) Integration task settings

Setting

Description

Value

Address

KATA server address

IP address (IPv4 or IPv6) or fully qualified domain name (FQDN) of the integration server can be specified.

To ensure that communication with the KATA server is not interrupted if the application fails when network isolation is enabled for the device, it is recommended to specify the server's IP address.

Default value: 127.0.0.1.

Port

Port to connect to the KATA server.

The default value is 443.

UseClientPinnedCertificate

Enable and disable two-way authentication to further secure the connection to the KATA server.

If two-way authentication is enabled on the KATA server side, you need to enable two-way authentication in the settings of Kaspersky Endpoint Detection and Response (KATA) Integration task and add the client certificate before starting the task.

Yes – use two-way authentication to further secure the connection to the KATA server.

No (default value) — do not use two-way authentication.

SynchronizationPeriod

Frequency of sending synchronization requests to the KATA server in minutes.

The default value is 5.

ConnectionTimeout

Maximum time to wait for a connection to the KATA server in seconds.

The default value is 10.

RequestTimeout

Maximum time to wait for a response from the KATA server in seconds.

The default value is 10.

MaximumDataTransferTime

The maximum delay in sending events to the KATA server in seconds.

The default value is 30.

UseRequestCountLimits

Enable and disable regulating the number of events sent to the KATA server.

Yes (default value) – regulate the number of events sent.

No – do not regulate the number of events.

MaximumNumberOfEventsInHour

Maximum number of events per hour

The default value is 3000.

EventLimitExceededPercentage

Event throttle threshold (percentage). Sending events is limited if the ratio of events of a certain type to the total number of events exceeds the configured threshold (as a percentage).

The default value is 15.

EnableTelemetry

Enable and disable sending event data (telemetry) to the KATA server.

Yes (default value) – send telemetry to the KATA server.

No – do not send telemetry.

Page top

[Topic 245754]

Managing certificates for connecting to KATA servers

Managing certificates requires the rights of a user with the Administrator (admin) role.

You can manage certificates used to connect to KATA servers using commands. What you can do with certificates:

  • Add or replace the server certificate
  • Display information about the server certificate
  • Remove the server certificate
  • Add or replace the client certificate
  • Display information about the client certificate
  • Remove the client certificate

To add or replace the server certificate, run the following command:

kesl-control [-R] --add-kataedr-server-certificate <file path>

where <file path> is the path to the file containing the server certificate.

To add or change a client certificate:

  1. Execute the command:

    kesl-control [-R] --add-kataedr-client-certificate <file path>

    where <file path> is the path to the cryptocontainer (PFX archive) containing the client certificate and private key.

  2. If the cryptocontainer is password-protected, enter the password when prompted.

The client certificate is used for additional protection of the connection to the KATA server if client certificate verification is enabled in KATA server settings and in the Kaspersky Endpoint Detection and Response (KATA) Integration task settings the UseClientPinnedCertificate setting has the value yes.

To display certificate information, run the following command:

  • for the server certificate:

    kesl-control [-R] --query-kataedr-server-certificate

  • for the client certificate:

    kesl-control [-R] --query-kataedr-client-certificate

Running the command displays the following certificate information:

  • certificate serial number
  • certificate subject
  • certificate issuer
  • certificate start date
  • certificate expiration date
  • SHA1 and SHA256 certificate fingerprints

To delete the server certificate information, run the following command:

kesl-control [-R] --remove-kataedr-server-certificate

To delete the client certificate information, run the following command:

kesl-control [-R] --remove-kataedr-client-certificate

Page top

[Topic 246794]

Using Kaspersky Security Network

To increase the protection of devices and user data, Kaspersky Endpoint Security can use Kaspersky cloud-based knowledge base Kaspersky Security Network (KSN) to check the reputation of files, Internet resources, and software. Using Kaspersky Security Network data ensures a faster response to various threats, high protection component performance, and fewer false positives.

Use of Kaspersky Security Network is voluntary. Kaspersky Endpoint Security prompts you to enable KSN usage during the initial configuration of the application. You can start or stop using KSN at any time.

Kaspersky Security Network infrastructure solutions

Kaspersky Endpoint Security supports the following infrastructure solutions to work with Kaspersky reputation databases:

  • Kaspersky Security Network (KSN) – A solution that receives information from Kaspersky and sends data about objects detected on user devices to Kaspersky for additional verification by Kaspersky analysts and to add to reputation and statistical databases.
  • Kaspersky Private Security Network (KPSN) – A solution that allows users of devices with Kaspersky Endpoint Security installed to access the reputation databases of Kaspersky, as well as other statistical data, without sending data to Kaspersky from their devices. KPSN is designed for corporate clients who can't use Kaspersky Security Network, for example, for the following reasons:
    • No connection of local workplaces to the Internet
    • Legal prohibition or corporate security restrictions on sending any data outside the country or the organization's local network

After changing the Kaspersky Endpoint Security license, submit the details of the new key to the service provider in order to be able to use KPSN. Otherwise, an authentication error will prevent data exchange with KPSN.

Kaspersky Security Network usage options:

There are two options for using KSN:

  • Extended KSN mode – you can receive information from the Kaspersky knowledge base, while Kaspersky Endpoint Security automatically sends statistical information to Kaspersky Security Network that it obtained during its operation. The application can also send to Kaspersky for additional scanning certain files (or parts of files) that intruders can use to harm the device or data.
  • Basic KSN mode – you can receive information from the Kaspersky knowledge base, but Kaspersky Endpoint Security does not send anonymous statistics and data about the types and sources of threats.

You can select a different Kaspersky Security Network usage option at any time.

No personal data is collected, processed, or stored. Detailed information about the storage, and destruction, and/or submission to Kaspersky of statistical information generated during participation in KSN is available in the Kaspersky Security Network Statement and on Kaspersky's website. The file with the text of the Kaspersky Security Network Statement is included in the application distribution kit.

Cloud mode for Kaspersky Endpoint Security

If Kaspersky Endpoint Security is used in standalone mode and you are using KSN in the application, you can enable cloud mode. If cloud mode is enabled, Kaspersky Endpoint Security uses a lightweight version of the malware databases. This lets you reduce the load on device memory.

Kaspersky Endpoint Security switches to using a lightweight version of the malware databases after enabling cloud mode and performing the latest update of the application databases and modules. If cloud mode is disabled, Kaspersky Endpoint Security downloads the full version of the application databases from Kaspersky servers during the next update of application databases and modules.

Kaspersky Security Network facilitates the application's use of the lightweight malware databases. If you are not using KSN or cloud mode is disabled, Kaspersky Endpoint Security uses the full version of the application databases.

Cloud mode is disabled automatically if use of KSN is disabled.

If Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments, use of the lightweight malware databases is not supported. Kaspersky Endpoint Security receives special databases necessary for the operation of the Light Agent from the Protection Server.

Using the KSN Proxy service

User devices managed by Kaspersky Security Center Administration Server can interact with KSN via the KSN Proxy service.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KSN Proxy service facilitates interaction with the KSN infrastructure. If the KSN proxy is not available, KSN is not used by the application.

A KSN proxy server provides the following capabilities:

  • The user's device can query KSN and submit information to KSN, even without direct access to the Internet.
  • A KSN proxy server caches processed data, thereby reducing the load on the external network connection and speeding up receipt of the information that is requested by the user's device.

KSN proxy server settings can be configured in the Kaspersky Security Center Administration Server properties. For details about the KSN proxy server, refer to the Kaspersky Security Center Help.

In this Help section

Enabling and disabling Kaspersky Security Network usage from the command line

Enabling and disabling cloud mode from the command line

Checking the connection to Kaspersky Security Network using the command line

Page top

[Topic 198040]

Enabling and disabling Kaspersky Security Network usage from the command line

To enable use of Kaspersky Security Network in extended mode, execute the following command:

kesl-control --set-app-settings UseKSN=Extended --accept-ksn

To enable use of Kaspersky Security Network in standard mode, execute the following command:

kesl-control --set-app-settings UseKSN=Basic --accept-ksn

To disable use of Kaspersky Security Network, execute the following command:

kesl-control --set-app-settings UseKSN=No

To enable or disable use of Kaspersky Security Network with a configuration file, execute the following command:

kesl-control --set-app-settings --file <configuration file name> [--accept-ksn]

To enable the use of Kaspersky Security Network, execute the following command: kesl-control --set-settings with the --accept-ksn option.

If Kaspersky Endpoint Security installed on a client device runs under a policy that was assigned in Kaspersky Security Center, the value of the UseKSN setting can only be modified by using Kaspersky Security Center. When Kaspersky Endpoint Security installed on a client device stops running under a policy, the following value is assigned to the setting: UseKSN=No.

The file ksn_license.<language ID> containing the text of the Kaspersky Security Network Statement is located in the directory /opt/kaspersky/kesl/doc/.

Page top

[Topic 265411]

Enabling and disabling cloud mode from the command line

Cloud mode is an operating mode of Kaspersky Endpoint Security that uses a lightweight version of the malware databases.

If Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments, use of the lightweight malware databases is not supported. Kaspersky Endpoint Security receives special databases necessary for the operation of the Light Agent from the Protection Server.

Cloud mode is available if use of Kaspersky Security Network is enabled.

To enable cloud mode, run the following command:

kesl-control --set-app-settings CloudMode=Yes

Kaspersky Endpoint Security switches to using a lightweight version of the malware databases after enabling cloud mode and performing the latest update of the application databases and modules.

To disable cloud mode, run the following command:

kesl-control --set-app-settings CloudMode=No

Kaspersky Endpoint Security downloads the full version of the application databases from Kaspersky servers during the next update of application databases and modules.

You can also enable or disable cloud mode using the configuration file.

If you plan to use cloud mode, make sure KSN is available on your device.

Page top

[Topic 246852]

Checking the connection to Kaspersky Security Network using the command line

To check the connection to Kaspersky Security Network, run the following command:

kesl-control --app-info

The Using Kaspersky Security Network line displays the status of the connection to Kaspersky Security Network:

  • If Extended KSN mode is displayed, Kaspersky Endpoint Security uses Kaspersky Security Network, information can be obtained from the knowledge base, and anonymous statistics and information about the types and sources of threats are sent.
  • If Basic KSN mode is displayed, Kaspersky Endpoint Security uses Kaspersky Security Network and information can be obtained from the knowledge base, but anonymous statistics and information about the types and sources of threats are not sent.
  • If the status is Disabled, Kaspersky Endpoint Security does not use Kaspersky Security Network.

The Kaspersky Security Network Infrastructure line displays information about the infrastructure solution that is used to work with Kaspersky reputation databases: Kaspersky Security Network or Kaspersky Private Security Network.

A connection to Kaspersky Security Network may be absent for the following reasons:

  • The user device is not connected to the internet.
  • The use of Kaspersky Security Network is disabled.
  • The application has not been activated or the license has expired.
  • Problems related to the license key are detected. For example, the key is in the denylist.
Page top

[Topic 247439]

Integration with Kaspersky Managed Detection and Response

Integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response enables continuous search, detection and elimination of threats aimed at your organization.

When interacting with Kaspersky Managed Detection and Response, Kaspersky Endpoint Security can carry out the following functions:

  • Send telemetry data to Kaspersky Managed Detection and Response for threat detection.
  • Execute Kaspersky Managed Detection and Response commands for providing security features.

To configure integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response, perform the following actions:

You can also configure integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response and upload a BLOB configuration file from the command line.

To enable integration with Kaspersky Managed Detection and Response, execute the following command:

kesl-control --set-app-settings UseMDR=Yes

To disable integration with Kaspersky Managed Detection and Response, execute the following command:

kesl-control --set-app-settings UseMDR=No

To load the BLOB configuration file, execute the following command:

kesl-control --load-mdr-blob <path to MDR BLOB configuration file>

To remove the BLOB configuration file, execute the following command:

kesl-control --remove-mdr-blob

After enabling integration of Kaspersky Endpoint Security with Kaspersky Managed Detection and Response, a Mdr_Autostart_Scan task is created in the application and will run once a day. If necessary, you can configure the start time for this task using the kesl-control --set-schedule <task ID|task name> --file <full path to file> command, specifying the task name "Mdr_Autostart_Scan" or the ID assigned to this task by the application. The task's other settings and schedule cannot be configured.

If Kaspersky Endpoint Security is integrated with Kaspersky Managed Detection and Response, a large number of events can be written to the systemd log. If you want to disable the logging of audit events to the systemd log, disable the systemd-journald-audit socket and restart the operating system.

To disable the systemd-journald-audit socket, run the following commands:

systemctl stop systemd-journald-audit.socket

systemctl disable systemd-journald-audit.socket

systemctl mask systemd-journald-audit.socket

Page top

[Topic 213821]

KESL container

Kaspersky Endpoint Security distribution kit contains files for creating a container application ("KESL container") for embedding into external systems in order to scan container images from image repositories.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KESL container functionality is not supported.

After deploying, activating and configuring the KESL container, the following functionality is available in it:

  • Scanning images of the containers located in repositories.
  • Transferring scanned images that do not contain infected objects to a trusted repository.

Interaction with the KESL container is performed using REST API. It is also possible to configure KESL container settings using Kaspersky Security Center.

KESL containers cannot be managed using the command line.

In this Help section

Deploying and activating KESL container

Configuring KESL container

Working with REST API

Page top

[Topic 213822]

Deploying and activating KESL container

Distribution package description

The distribution package contains the following files:

  • docker-service-<version>.tgz – Archive with files necessary to create the image
  • kesl-<version>.rpm – Kaspersky Endpoint Security installation package
  • klnagent.rpm – Kaspersky Security Center Network Agent installation package

The docker-service-<version>.tgz archive contains the following files:

  • kesl-service – directory of the container application files.
  • Dockerfile – file for building a docker image of a version below 18.06.
  • Dockerfile.1809 – file for building a docker image of a version later than 18.05.
  • build.sh.example – example of a script for building an image.
  • run.sh.example – example of a script for launching a KESL container.
  • kesl-service.config.example – example of a container application configuration file.
  • klnagent.conf.example – example of a configuration file for connecting to Kaspersky Security Center.
  • readme.md – quick reference.

KESL container deployment and activation

To prepare a KESL container for use:

  1. Unpack the tar -xvf docker-service-<version>.tgz archive.
  2. If you want to configure the KESL container settings using Kaspersky Security Center, do the following:
    1. In the klnagent.conf.example file, specify the values ​​of the Network Agent variables. For more information, refer to Kaspersky Security Center documentation (the "Installing Network Agent for Linux in silent mode (with an answer file)" section).
    2. Copy klnagent.conf.example to kesl-service/klnagent.conf.
  3. Build the KESL container Docker image using the build.sh.example installation script:
    1. If you use a proxy server, specify the desired values ​​for the COMMON_AGRS variable.
    2. If necessary, change the name of the target kesl-service image to the desired one.
    3. Copy build.sh.example to build.sh and assign an executable file attribute to it.
    4. Run build.sh.
  4. Make sure that the build completed successfully by executing the docker images -a command.

    The following command execution result is displayed:

    REPOSITORY TAG IMAGE ID CREATED SIZE

    kesl-service latest <hex> <creation time> <size>

  5. Activate the KESL container in one of the following ways:
  6. Configure the KESL container.
  7. Start the KESL container using the following command docker run --privileged --init -p < <KESL container_port>:<device_port> \

    -e <variable_1> -e <variable_2> ... -e <variable_n> \

    -v <mount point_1> -v <mount point_2> ... -v <mount point_n> \

    <image name>

    where:

    <KESL container port> is the port of the KESL container, which must be accessible by the network from outside the KESL container.

    <device_port> –is the port of the device where the KESL container is installed.

    You can see an example of the run command in the file run.sh.example.

  8. If you want to activate the KESL container using an environment variable, do one of the following:
    • If you want to specify an activation code, add the following setting when starting the KESL container (see step 7): KRAS4D_ACTIVATION ='<activation code>':

      docker run ... -e KRAS4D_ACTIVATION='<activation code>'

    • If you want to apply the key file, add the following options when starting the KESL container (see step 7): KRAS4D_ACTIVATION ='<key file>' and KRAS4D_KEYPATH=/root/kesl-service/keys:

      docker run ... -e KRAS4D_ACTIVATION='<key file>' -e KRAS4D_KEYPATH=/root/kesl-service/keys -v <path to the directory with keys>:/root/kesl-service/keys

Page top

[Topic 213823]

Configuring KESL container

KESL container settings are initialized in several ways:

  • By default (unless otherwise specified).
  • From the configuration file. In this case, the values ​​from the configuration file have a higher priority than the default values.
  • The values can be passed ​​to the KESL container upon startup as environment variables. Environment variables have a higher priority than the settings from the configuration file.
  • In the scan request body. The settings in the request body have the highest priority, but they are valid only within a single request.

In this section

KESL container settings

Environment variables

Configuration file

Available mount points

Page top

[Topic 234815]

KESL container settings

KESL container settings and their default values ​​are described in the following table.

KESL container settings

Setting description

Available values

Default value

Port for listening to REST API

 

8085

Event severity level

debug

info

warning

error

critical

noset

noset

Authorization key

If the KRAS4D_XAPIKEY setting is specified, each request is verified for the presence of the x-api-key header and if its content matches the value of the KRAS4D_XAPIKEY setting. If these conditions are not met, the request is rejected. If this setting is missing, verification is not performed.

 

Activation code or key file

To activate a KESL container using an activation code, when running the KESL container specify the activation code in the configuration file or pass the activation code in an environment variable:

docker run ... -e KRAS4D_ACTIVATION='<activation code>'

To activate a KESL container using a key file, when running the KESL container specify the key file in the configuration file or pass the key file in an environment variable:

docker run ... -e KRAS4D_ACTIVATION='<key file>' -e KRAS4D_KEYPATH=/root/kesl-service/keys -v <path to key directory>:/root/kesl-service/keys

To activate a KESL container using a key file, the /root/kesl-service/keys mount point is required.

 

Additional scan settings

The optional KRAS4D_SCANOPTIONS setting allows you to configure the settings of the Container Scan task:

docker run ... -e KRAS4D_SCANOPTIONS='<settings>'

where <settings> are the settings of the Container Scan task.

 

Additional update settings

The optional KRAS4D_UPDATEOPTIONS setting allows you to configure the settings of the Update task.

docker run ... -e KRAS4D_UPDATEOPTIONS='<settings>'

where <settings> are the Update task settings SourceType and ApplicationUpdateMode, as well as the settings in the CustomSources.item_# section.

 

Update the application databases when KESL container starts

By default, the application databases are downloaded to the /var/opt/kaspersky/kesl/private/updates directory when the KESL container is started.

To implement the joint operation of several KESL containers with one instance of the application databases and to speed up the launch of the KESL container, it is recommended to move this directory to the device where the KESL container is installed by means of mounting:

docker run ... -v <path to database directory>:/var/opt/kaspersky/kesl/private/updates

True

Do not process the image if it already exists in the target repository.

 

False

Maximum time to wait for application commands to run, in seconds

 

600

Maximum time to wait for application database update tasks to run, in seconds

 

600

Name of the settings configuration file.

 

kesl-service.config

Page top

[Topic 234816]

Environment variables

The following environment variables can be used to configure a KESL container:

  • KRAS4D_PORT – port for listening to REST API.
  • KRAS4D_LOGLEVEL – event severity level.
  • KRAS4D_XAPIKEY – request authorization key.
  • KRAS4D_ACTIVATION – activation code or key file name.
  • KRAS4D_SCANOPTIONS – additional scan settings.
  • KRAS4D_UPDATEOPTIONS – additional update settings.
  • KRAS4D_FORCEUPDATE – update the application databases when KESL container starts.
  • KRAS4D_SKIPIMAGEIFEXISTS – do not process the image if it already exists in the target repository.
  • KRAS4D_GENERALTIMEOUT – maximum time to wait for application commands to run.
  • KRAS4D_UPDTASKTIMEOUT – maximum time to wait for application database update tasks to run.
  • KRAS4D_CFGNAME: name of the KESL container configuration file.
Page top

[Topic 234817]

Configuration file

The KESL container configuration file uses the yaml format. To read the settings from the file, mount the /root/kesl-service/config/ path on the device where the KESL container is installed, and specify the name of the configuration file if it differs from the default one. Thus, you can specify individual configuration file for each set of KESL containers.

Example: starting a KESL container

docker run ... \

-e KRAS4D_CFGNAME='unique_file_name' \

-v <HOST_PATH>:/root/kesl-service/config \

kesl-service

The table below shows the configuration file settings and the corresponding environment variables.

Correspondence between the settings and the environment variables

Configuration file setting

Environment variable

Common section

port: <port for listening>

# KRAS4D_PORT=8085

sqlpath: <full path to the database file that contains scan results>

# KRAS4D_SQLPATH

certdir: <path to the directory with registry certificates>

# KRAS4D_CERTDIR

keypath: <path to the directory with license keys>

# KRAS4D_KEYPATH

tmppath: <full path to the temporary directory>

# KRAS4D_TMPPATH

logpath: <full path to the event log>

# KRAS4D_LOGPATH

loglevel: [noset|debug|info|warning|error|critical]

# KRAS4D_LOGLEVEL

Control section

xapikey: <request authorization key>

# KRAS4D_XAPIKEY=None

forceupdate: <forced database update at container start [True|False]>

# KRAS4D_FORCEUPDATE

activation: <activation code or key file name from /root/kesl-service/config/>

# KRAS4D_ACTIVATION

detectaction: [delete|skip]

# KRAS4D_DETECTACTION

scanoptions: <scan settings [ScanArchived=yes ScanSfxArchived=yes ...]>

# KRAS4D_SCANOPTIONS

skipimageifexist: <do not scan the image if it already exists on the server to which the scanned image is to be copied>

# KRAS4D_SKIPIMAGEIFEXIST

generaltimeout: <maximum time to wait for application commands to run>

# KRAS4D_GENERALTIMEOUT

updtasktimeout: <maximum time to wait for application database update tasks to run>

# KRAS4D_UPDTASKTIMEOUT

Repositories section

<server>:<port>: address and port of the image registry that requires authorization when requesting for verification.

 

Credentials subsection

user: user name for authorization in the image registry

 

pass: password for authorization in the image registry

 

Example of a configuration file

Example of a configuration file

Page top

[Topic 213865]

Available mount points

The following mount points are available for working with the KESL container:

  • /root/kesl-service/data/scans.sqlite – path to the database file that contains scan results.
  • /var/opt/kaspersky/kesl/private/updates – path to the application databases.
  • /root/kesl-service/certificates – path to the directory that contains repository certificates.
  • /root/kesl-service/keys – path to the directory that contains license keys.
  • /var/log/kaspersky/ – path to the directory that contains event logs.
  • /root/kesl-service/config/ – path to the configuration files.
  • /var/lib/containers/vfs-storage – required mount point for the Podman utility to work correctly.
Page top

[Topic 214323]

Working with REST API

Interaction with the KESL container is implemented using the REST API.

Using the REST API, you can submit the following requests:

Page top

[Topic 210898]

Events and reports

While the application is running, various events can occur. The events may be informational or may contain important data. For example, the application can use events to notify about a successful application database update, or to inform about an error in the operation of application components that must be eliminated.

The application generates various types of reports based on the events that occur while the application is running.

Events and reports may contain the following personal data:

  • User name and user ID of operating system users
  • Paths to user files
  • IP addresses of remote devices that are scanned by the Anti-Cryptor task
  • IP addresses of senders and receivers of network packets scanned by the Firewall Management task
  • Web addresses of the update sources
  • General application settings
  • Task names and settings
  • Detected malicious, phishing, adware web addresses, and web addresses that contain legal software that may be used by criminals to damage your device or personal data
  • Names of the containers and images
  • Paths to the containers and images
  • Names and IDs of the devices
  • Web addresses of the repositories
  • File names, paths to files, and hash-sums of executable application files
  • Application category names

In this Help section

Viewing events

Viewing reports

Page top

[Topic 201952]

Viewing events

You can view events in the following ways:

  • In the application event log. The event log is located in the directory specified by the EventsStoragePath general application setting. By default, the application saves information about events to the database at /var/opt/kaspersky/kesl/private/storage/events.db. Root privileges are required to access the database of events.
  • In the general application settings, if the UseSysLog setting has the value Yes, then event data is also written to syslog. Root privileges are required to access syslog.
  • Enable output of current application events using the kesl-control -W command.
  • If Kaspersky Endpoint Security is managed by Kaspersky Security Center, information about events may be transmitted to the Kaspersky Security Center Administration Server. Aggregation rules apply to certain events. If a large number of same-type events are created within a short period of time while the application is running, the application will switch to event aggregation mode and send to Kaspersky Security Center one aggregated event with a description of the events settings. Different aggregation rules may be used for different events. The administrator can configure the execution of a script upon receiving events from the application or upon receiving notifications about events by e-mail. For more information about events, refer to Kaspersky Security Center documentation.
  • If the graphical user interface (GUI) is enabled, information about events can be viewed in reports and in application pop-up windows.

To get information about all events in the event log, run the following command:

kesl-control -E --query|less

By default, the application stores up to 500,000 events. You can use the less command to navigate through the list of displayed events.

You can view specific events using the application's event store query system.

When creating a query, indicate the required field, select a comparison operator, and specify the desired value. The value must be specified in single quotation marks ('), and the whole query must be specified in double quotation marks ("):

--query "<field> <comparison operator> '<value>' [and <field> <comparison operator> '<value>' *]"

You can specify a date value in UNIX time (the number of seconds that have elapsed since 00:00:00 (UTC), January 1, 1970) or in YYYY-MM-DD hh:mm:ss format. The user specifies the date and time in the user's local time zone, and the application displays them in the same time zone.

ThreatDetected example:

EventType=ThreatDetected

EventId=2671

Initiator=Product

Date=2020-04-30 17:17:17

DangerLevel=Critical

FileName=/root/eicar.com.txt

ObjectName=File

TaskName=File_Monitoring

RuntimeTaskId=2

TaskId=1

DetectName=EICAR-Test-File

TaskType=OAS

FileOwner=root

FileOwnerId=0

DetectCertainty=Sure

DetectType=Virware

DetectSource=Local

ObjectId=1

AccessUser=root

AccessUserId=0

Query examples:

Get all events by the EventType field:

kesl-control -E --query "EventType == 'ThreatDetected'"

Display all events with the specified values of the EventType and FileName fields:

kesl-control -E --query "EventType == 'ThreatDetected' and FileName like '%eicar%'"

Get events generated by File_Threat_Protection task after the date specified in UNIX time (the number of seconds that have elapsed since 00:00:00 (UTC), January 1, 1970):

kesl-control -E --query "TaskName == 'File_Threat_Protection' and Date > '1588253494'"

Get all events generated by the File_Threat_Protection task after the date specified in YYYY-MM-DD hh:mm:ss format:

kesl-control -E --query "TaskName == 'File_Threat_Protection' and Date > '2022-11-22 18:42:54'"

Page top

[Topic 198070]

Viewing reports

Information about the operation of each Kaspersky Endpoint Security component, the performance of each task, and the overall operation of the application is recorded in reports.

You can view reports in the following ways:

  • If Kaspersky Endpoint Security is managed using Kaspersky Security Center, you can generate and view Kaspersky Security Center reports in the Administration Console and in the Web Console. You can use Kaspersky Security Center reports, for example, to get information about infected files or usage of keys and application databases. For detailed information on working with Kaspersky Security Center reports, refer to Kaspersky Security Center documentation.
  • If the graphical user interface (GUI) is enabled, information about application events is displayed in the application reports.
Page top

[Topic 245658]

Managing the application using the Administration Console

This section describes administering Kaspersky Endpoint Security using Kaspersky Security Center Administration Console.

This description is provided for Kaspersky Security Center 14.2.

Kaspersky Security Center Administration Console (hereinafter also referred to as the "Administration Console") is Microsoft Management Console (MMC) snap-in that is installed on the administrator's workstation and provides user interface for the Administration Server and Network Agent administrative services.

The Administration Console lets you remotely install and uninstall, start and stop Kaspersky Endpoint Security, configure application settings, and start tasks on the managed devices.

The application is managed through the Administration Console by means of the Kaspersky Endpoint Security management MMC plug-in.

To manage Kaspersky Endpoint Security using the Administration Console, move the devices, on which Kaspersky Endpoint Security is installed, to administration groups. You can create administration groups in Kaspersky Security Center before Kaspersky Endpoint Security installation and configure rules to automatically move the devices to administration groups. You can also manually move the devices from the Unassigned devices folder to administration groups after installing Kaspersky Endpoint Security (for details, refer to Kaspersky Security Center documentation).

You can perform the following actions in the Kaspersky Security Center Administration Console:

If the user account which is used to access the Administration Server does not have permissions to edit the settings of certain functional scopes, the settings of these functional scopes are not available for editing. Configuration of some settings is not supported in the KESL container.

In this Help section

Starting and stopping the application on a client device

Viewing the protection status of a device

Viewing application settings

Updating application databases and modules

Managing policies in the Administration Console

Policy settings

Managing tasks in the Administration Console

Task settings

Configuring integration with Kaspersky Managed Detection and Response

Configuring KESL container settings

Manually checking the connection with the Administration Server. Klnagchk utility

Manually connecting to the Administration Server. Klmover utility

Remote diagnostics of client devices. Kaspersky Security Center remote diagnostics utility

Page top

[Topic 198045]

Starting and stopping the application on a client device

To start or stop the application on a client device:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder of the Administration Console tree, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the device for which you want to start or stop the application. In the device context menu, select Properties.
  5. In the Properties: <Device name> window, select the Applications section.

    The right part of the window displays a list of Kaspersky applications installed on the device.

  6. Select Kaspersky Endpoint Security 12.0 for Linux.
  7. Do one of the following:
    1. To run the application, click the button to the right of the list of Kaspersky applications or select Start in the application context menu.
    2. To stop the application, click the button to the right of the list of Kaspersky applications or select Stop in the application context menu.

Page top

[Topic 198046]

Viewing the protection status of a device

To view the protection status of a device:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the required device and select Properties in the device context menu.
  5. In the Properties: <Device name> window, select the Protection section.

The Protection section displays the following information about the protected device:

  • Device status: status of the client device generated based on the criteria set by the administrator for the protection status of the device and the device activity in the network.
  • All problems: complete list of problems detected by the managed applications installed on the client device. Each problem has a status that the application prompts to assign to the device.
  • Real-time protection status: current status of the File Threat Protection task, such as Running or Stopped. When the device status changes, the new status is displayed in the device properties window only after the client device is synchronized with the Administration Server.
  • Last on-demand scan: date and time when the last malware scan was performed on the client device.
  • Total threats detected: total number of threats detected on the client device since the installation of the application (first scan) or since the last reset of the threat counter.

    To reset the counter, click the Reset button.

  • Active threats: the number of unprocessed files on the client device.

Page top

[Topic 245859]

Viewing application settings

To view the application settings:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the required device and select Properties in the device context menu.
  5. In the Properties: <Device name> window, select the Applications section.

    The right part of the window displays a list of Kaspersky applications installed on the device.

  6. Select Kaspersky Endpoint Security 12.0 for Linux.
  7. Click the Properties button under the list of applications or select Properties in the application context menu.

    The Kaspersky Endpoint Security 12.0 for Linux settings window opens.

The Kaspersky Endpoint Security 12.0 for Linux settings window displays the following information about Kaspersky Endpoint Security:

  • The General section contains general information about the installed application:
    • Version number: the version number of the application
    • Installed — Date and time when the application was installed on the protected device
    • Current status: status of the File Threat Protection task, such as Running or Paused
    • Last software update: date and time when Kaspersky Endpoint Security software modules were last updated
    • Installed updates: list of software modules for which updates are installed
    • Application databases: date and time when the application databases were created and last updated
  • The Components section contains a list of standard application components. The status (for example, Stopped, Suspended, Not Installed) and version of each component is displayed.

    In the Light Agent mode for protecting virtual environments line, you can see information about the application usage mode:

    • The Running status means that the application is being used in Light Agent mode;
    • The Not installed status means that the application is being used in standalone mode.
  • The License keys section contains information about the active key and reserve keys:
    • Serial number – unique alphanumeric sequence.
    • Status – The status of the license key, e.g. active or reserve.
    • Type: type of license (commercial or trial).
    • License validity period — Number of days during which you can use the application activated with this key.
    • License limit — Number of devices on which you can use the key.
    • Activation date (this field is only available for the active key): date when the active key was added.
    • License expiration date (this field is only available for the active key): date when the application can no longer be used with the current active key.
  • The Event settings section displays the types of events that the application stores in event storage and how long they are stored.
  • The Advanced section contains information about the application administration plug-in.

Page top

[Topic 212135]

Updating application databases and modules

The procedure for updating Kaspersky Endpoint Security databases and modules depends on application mode. This section describes how to update the application in standalone mode. If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the application databases and modules cannot be updated using the task created in Kaspersky Security Center. Updates are performed using a local predefined task.

Updating the databases and application modules of Kaspersky Endpoint Security ensures up-to-date protection on your device. New viruses, malware, and other types of threats appear worldwide on a daily basis. Kaspersky Endpoint Security databases contain information about threats and ways of neutralizing them. To detect threats quickly, you are urged to regularly update the application databases and modules.

The following objects are updated on users' devices:

  • Application databases. Application databases include databases of malware signatures, a description of network attacks, databases of malicious and phishing web addresses, databases of banners, spam databases, and other data.
  • Application modules. Module updates are intended to eliminate vulnerabilities in the application and to improve methods of protecting devices. Module updates may change the behavior of application components and add new capabilities.

Kaspersky Endpoint Security supports the following scenarios for updating databases and application modules:

  • Update from Kaspersky servers. Kaspersky update servers are located in different countries around the world, which ensures a high reliability of updates. If an update cannot be performed from one server, Kaspersky Endpoint Security switches over to the next server.
  • Centralized update Centralized update reduces external Internet traffic, and provides for convenient monitoring of the update.

    Centralized update consists of the following steps:

    1. Download the update package to a repository within the organization's network.

      The update package is downloaded to the repository by the Download updates to Administration Server repository task of the Administration Server.

    2. Distribute the update package to client devices

      The update package is distributed to the client devices by the Update task of Kaspersky Endpoint Security. You can create an unlimited number of update tasks for each administration group.

By default, the list of update sources contains Kaspersky update servers and the Kaspersky Security Center Administration Server. You can add other update sources to the list. You can specify FTP-, HTTP-, or HTTPS servers as update sources. If an update cannot be performed from an update source, Kaspersky Endpoint Security switches to the next update source.

Updates are downloaded from Kaspersky update servers or from other FTP, HTTP, or HTTPS servers over standard network protocols. If connection to a proxy server is required to access the update sources, specify the proxy server settings in the Kaspersky Endpoint Security policy settings.

In this section

Updating from the Administration Server repository

Updating using Kaspersky Update Utility

Using a proxy server for updates

Page top

[Topic 247144]

Updating from the Administration Server repository

To save Internet traffic, you can configure updates of application databases and modules on devices on the organization's LAN from a server repository. To do this, in Kaspersky Security Center you need to configure downloading the update package from Kaspersky update servers in the Administration Server repository. Other devices on the organization's LAN will be able to receive the update package from the server repository.

Configuring application database and module updates from the server repository consists of the following steps:

  1. Download application databases and modules to the Administration Server repository using the Download updates to the Administration Server repository task of Kaspersky Security Center.
  2. Configure updates of application databases and modules from the Administration Server repository on the remaining hosts using the Update task.

To configure updates of application databases and modules from the Administration Server repository:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Administration Console tree, select the Tasks folder.

    The list of tasks is displayed in the right part of the window.

  3. In the list of tasks, select the Update task for Kaspersky Endpoint Security and double-click to open the task properties window.

    The Update task is created automatically by the Quick Start Wizard.

  4. In the task properties window, select the Update sources section in the list on the left.

    The task settings are displayed in the right part of the window.

  5. In the Database update source section, select the Kaspersky Security Center Administration Server option.
  6. Select the Use Kaspersky update servers if other update sources are not available check box if you want to the Update task to use Kaspersky update servers if the Administration Server repository is unavailable.
  7. Click Apply.
Page top

[Topic 212133]

Updating using Kaspersky Update Utility

To reduce Internet traffic, you can configure updates of application databases and modules on devices of the organization's LAN from a shared directory by using the Kaspersky Update Utility. For this purpose, one of the devices in the organization LAN must receive update packages from the Kaspersky Security Center Administration Server or from Kaspersky update servers and copy the received update packages to the shared directory by using the utility. Other devices on the organization's LAN will be able to receive the update package from this shared directory.

Configuring application database and module updates from a shared directory consists of the following steps:

  1. Install Kaspersky Update Utility on one of the devices of the organization's LAN.
  2. Configure copying of the update package to the shared directory in the Kaspersky Update Utility settings.
  3. Configure application database and module updates from the specified shared directory to the remaining devices on the organization's LAN.

You can download the Kaspersky Update Utility distribution kit from the Kaspersky Technical Support website. After installing the utility, select the update source (for example, the Administration Server repository) and the shared directory to which the Kaspersky Update Utility will copy update packages. For detailed information about using Kaspersky Update Utility, refer to the Kaspersky Knowledge Base.

To configure updates from a shared directory:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Administration Console tree, select the Tasks folder.

    The list of tasks is displayed in the right part of the window.

  3. In the list of tasks, select the Update task for Kaspersky Endpoint Security and double-click to open the task properties window.

    The Update task is created automatically by the Quick Start Wizard.

  4. In the task properties window, select the Update sources section.

    The task settings are displayed in the right part of the window.

  5. In the Database updates source section, select the Other sources on the local or global network option.
  6. In the table of update sources, click the Add button.
  7. In the Update source field, specify the path to the shared directory.

    The source address must match the address indicated in the Kaspersky Update Utility settings.

  8. Select the Use this source check box and click OK.
  9. In the table, set the order of the update sources using the Up and Down buttons.
  10. Click Apply.
Page top

[Topic 247266]

Using a proxy server for updates

You may be required to specify proxy server settings to download database and application module updates from the update source. If there are multiple update sources, proxy server settings are applied for all sources. If a proxy server is not needed for some update sources, you can disable the use of a proxy server in Kaspersky Endpoint Security policy settings. The application will also use a proxy server to access Kaspersky Security Network and activation servers.

To enable use of a proxy server for a specific administration group:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the desired administration group on devices on which you want to disable use of a proxy server.
  3. In the workspace, select the Policies tab.
  4. Select the required policy and in the context menu of the policy, select Properties.

    The Properties: <Policy name> window will open.

  5. Select the General settingsProxy server settings section.
  6. In the Proxy server settings section, select the Use specified proxy server settings and specify the required proxy server settings.
  7. Click OK.
Page top

[Topic 201940]

Managing policies in the Administration Console

A policy is a set of Kaspersky Endpoint Security operation settings applied to an administration group. You can use policies to apply identical Kaspersky Endpoint Security settings to all client devices within an administration group.

Multiple policies with different values of the settings can be configured for a single application. However, there can be only one active policy at a time for an application within an administration group. When you create a new policy, all other policies within an administration group become inactive. You can change the policy status later.

Policies have a hierarchy, similarly to administration groups. By default, a child policy inherits the settings from the parent policy. A child policy is a policy of a nested hierarchy level, that is, a policy for nested administration groups and secondary Administration Servers. You can enable inheritance of the settings from the parent policy.

You can locally modify the values of the settings specified by the policy for individual devices within the administration group, if modification of these settings is not prohibited by the policy.

Each policy setting has a "lock" attribute that indicates whether child policy settings and local application settings can be modified. The "lock" status of a setting within a policy determines whether or not an application setting on a client device can be edited:

  • When a setting is "locked" (), you cannot edit the setting. The setting value specified by the policy is used for all client devices within the administration group.
  • When a setting is "unlocked" (), you can edit the setting. For all client devices in the administration group, the settings specified locally are used. The settings specified in the policy are not applied.

After the policy is applied for the first time, the application settings change in accordance with the policy settings.

You can perform the following operations with the policies:

  • Create a policy.
  • Edit policy settings.

    If the user account which is used to access the Administration Server does not have permissions to edit the settings of certain functional scopes, the settings of these functional scopes are not available for editing. Configuration of some settings is not supported in the KESL container.

  • Delete a policy.
  • Export and import a policy.
  • Change a policy status.
  • Compare policy versions in the Revision history section of the policy properties window.

You can also create policy profiles. A policy profile may contain settings that differ from the "base" policy settings and apply to client devices when the configured conditions (activation rules) are met. Using policy profiles allows you to flexibly configure operation settings for different devices. You can create and configure profiles in the Policy profiles section of the policy properties.

For general information on working with policies and policy profiles, refer to Kaspersky Security Center documentation.

In this section

Creating a policy

Editing policy settings

Page top

[Topic 198048]

Creating a policy

To create a policy:

  1. Open the Administration Console of Kaspersky Security Center.
  2. Do one of the following:
    • Select the Managed devices folder to create a policy for all the devices managed by Kaspersky Security Center.
    • In the Managed devices folder, select the folder with the name of the administration group containing client devices to which the policy should be applied.
  3. In the workspace, select the Policies tab.
  4. Click the New policy button.

    The Policy Wizard starts.

  5. In the drop-down list, select Kaspersky Endpoint Security 12.0 for Linux.

    Proceed to the next step of the wizard.

  6. Enter a name for the created policy.
  7. To use the settings from the previous version of Kaspersky Endpoint Security policy in the policy being created, select the Use policy settings for the earlier application version check box.

    Proceed to the next step of the wizard.

  8. Decide whether you want to use Kaspersky Security Network. Carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you agree with all the terms and conditions of the Statement and want the application to use Kaspersky Security Network, select I confirm that I have fully read, understand, and accept the terms and conditions of Kaspersky Security Network Statement.
    • If you do not want to use Kaspersky Security Network, select I do not accept the terms and conditions of the Kaspersky Security Network Statement and confirm your decision in the window that opens.

    Refusal to use Kaspersky Security Network does not interrupt the policy creation process. At any time, you can enable or disable use of Kaspersky Security Network or change the KSN mode for managed devices in the policy settings.

    Proceed to the next step of the wizard.

  9. Specify the Kaspersky Endpoint Security usage mode:
    • Standalone mode – the application is used to protect devices running Linux operating systems.
    • Light Agent mode for protecting virtual environments – as part of the Kaspersky Security for Virtualization Light Agent solution, the application is used to protect virtual machines running Linux guest operating systems.

    Proceed to the next step of the wizard.

  10. If you are using the application in Light Agent mode to protect virtual environments, configure the SVM discovery settings:
    1. Select the method that Light Agents use to discover SVMs available for connection.
      • Use the Integration Server

        If this option is selected, Light Agent connects to Integration Server to get a list of SVMs available for connection and their details.

      • Use a custom list of SVM addresses

        If this option is selected, you can specify a list of SVMs that Light Agents managed by this policy can connect to. Light agents will only connect to SVMs specified in the list.

      If you select the Use a custom list of SVM addresses option, the Light Agent is using the extended SVM selection algorithm, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. In the SVM selection algorithm section, you need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

    2. If you select Integration Server, the wizard displays the current settings for connecting Light Agents to the Integration Server: address and port for connecting. If necessary, specify new connection settings:
      1. Click the Edit button and specify new connection settings in the window that opens:
        • Address

          IP address in IPv4 format or fully qualified domain name (FQDN) of the device on which the Integration Server is installed.

          If the device on which Kaspersky Security Center Administration Console is installed is part of a domain, the field indicates the domain name of this device by default.

          If the device on which the Kaspersky Security Center Administration Console is installed is not part of a domain or the Integration Server is installed on another device, the field must be filled in manually.

          If a NetBIOS name, "localhost", or 127.0.0.1 is specified as the address, the connection to the Integration Server fails with an error.

        • Port

          Port for connecting to the Integration Server.

          Port 7271 is used by default.

      2. Click OK.
      3. If the device hosting the Kaspersky Security Center Administration Console does not belong to a domain or your account does not belong to the KLAdmins local or domain group or to the local administrator group, the Integration Server administrator account is used for authentication on the Integration Server.

        In the window that opens, enter the password of the Integration Server administrator (password of the admin account) and click the OK button.

      4. The MMC plug-in checks the SSL certificate received from the Integration Server. If the certificate contains an error or is not trusted, the Verify Integration Server certificate window opens. You can click the link in the window to view the details of the received certificate.

        If you encounter problems with an SSL certificate, we recommend to make sure that the data transmission channel you are using is secure.

        To continue connecting to the Integration Server, click the Ignore button. The received certificate will be installed as a trusted certificate on the device where the Kaspersky Security Center Administration Console is installed.

    3. If you select a manually defined list of SVM addresses, the window displays a list of SVMs that Light Agents managed by this policy can connect to. To add an SVM to the list, click the Add button and in the window that opens specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the SVM. You can enter multiple IP addresses or FQDNs of SVMs on a new line.

      Specify only fully qualified domain names (FQDNs) that map to a single IP address. Using a fully qualified domain name that corresponds to multiple IP addresses can lead to errors in the application.

      You can delete addresses selected in the list by clicking the Delete button.

    Proceed to the next step of the wizard.

  11. If necessary, configure the File Threat Protection settings.

    Proceed to the next step of the wizard.

  12. If necessary, modify the default scan settings.

    Proceed to the next step of the wizard.

  13. If necessary, configure exclusion areas.

    Proceed to the next step of the wizard.

  14. If necessary, modify the default actions for infected objects.

    Proceed to the next step of the wizard.

  15. Complete the New Policy Wizard.

Page top

[Topic 198049]

Editing policy settings

To edit policy settings:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the required administration group for which you want to edit the policy settings.
  3. In the workspace, select the Policies tab.
  4. Select the required policy and in the context menu of the policy, select Properties.

    The Properties: <Policy name> window will open.

  5. Edit the policy settings.
  6. In the Properties: <Policy name> window, click OK to save the changes.

If the user account which is used to access the Administration Server does not have permissions to edit the settings of certain functional scopes, the settings of these functional scopes are not available for editing. Configuration of some settings is not supported in the KESL container.

Page top

[Topic 246374]

Policy settings

You can use the policy to configure Kaspersky Endpoint Security settings for all client devices included in the administration group.

The set of policy settings and default values depend on the type of application license. Some policy settings are applied or not applied to the application depending on the application mode. Additionally, some application functions are not supported in a KESL container.

You can configure the application operation settings in the sections and subsections of the policy properties window described in the table below. For information about configuring general policy settings and event settings, refer to Kaspersky Security Center documentation.

Sections of the Policy properties window

In this section

File Threat Protection

Exclusion scopes

Exclusions by process

Firewall Management

Web Threat Protection

Network Threat Protection

Kaspersky Security Network

Application Control

Anti-Cryptor

System Integrity Monitoring

Device Control

Behavior Detection

Task management

Removable Drives Scan

Proxy server settings

Application settings

Container Scan settings

Managed Detection and Response

Network settings

Global exclusions

Excluding process memory

Storage settings

Kaspersky Endpoint Detection and Response (KATA) Integration

Light Agent mode

Page top

[Topic 210477]

File Threat Protection.

File Threat Protection prevents infection of the file system on the user device. File Threat Protection starts automatically with the default settings upon Kaspersky Endpoint Security start. It resides in the device operating memory and scans all files that are opened, saved, and launched.

File Threat Protection settings

Setting

Description

Enable File Threat Protection

This check box enables or disables File Threat Protection on all managed devices.

The check box is selected by default.

File Threat Protection mode

In this drop-down list, you can select the File Threat Protection mode:

  • Smart check (default value) – scan a file when there is an attempt to open it and scan it again when there is an attempt to close it if the file has been modified. If a process accesses and modifies a file multiple times in a certain period, the application scans the file again only when the process closes it for the last time.
  • When opened – scan the file on an attempt to open it for reading, execution, or modification.
  • When opened and modified – scan a file on an attempt to open it, and scan it again on an attempt to close it if the file has been modified.

Scan

This group of settings contains buttons that open windows where you can configure the scan scopes and scan settings.

Action on threat detection

This group of settings contains the Configure button. Clicking this button opens the Action on threat detection window, where you can configure the actions that the application performs on detected infected objects.

Page top

[Topic 202257]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Scan scope settings

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 248962]

<New scan scope> window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scan scope name

Field for entering the scan scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the scan scope.

You can select the file system type in the drop-down list of file systems:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

If Shared or Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want to add to the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 236888]

Scan settings window

In this window, you can configure file scan settings while File Threat Protection is enabled.

File Threat Protection settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If this check box is selected, Kaspersky Endpoint Security scans archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by enabling and configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If this check box is cleared, Kaspersky Endpoint Security does not scan archives.

This check box is cleared by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are archives that contain an executable extraction module.

If this check box is selected, Kaspersky Endpoint Security scans self-extracting archives.

If this check box is cleared, Kaspersky Endpoint Security does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

This check box is cleared by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If this check box is selected, Kaspersky Endpoint Security scans mail database files.

If this check box is cleared, Kaspersky Endpoint Security does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, Kaspersky Endpoint Security scans plain-text messages.

If this check box is cleared, Kaspersky Endpoint Security does not scan plain-text messages.

This check box is cleared by default.

Skip text files

Temporary exclusion of files in text format from scans.

If the check box is selected, Kaspersky Endpoint Security does not scan text files if they are used by the same process within 10 minutes after the most recent scan. This setting makes it possible to optimize scans of application logs.

If this check box is unselected, Kaspersky Endpoint Security scans text files.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, Kaspersky Endpoint Security stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 60.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, Kaspersky Endpoint Security scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, Kaspersky Endpoint Security logs ObjectProcessed type events for all scanned objects.

If this check box is cleared, Kaspersky Endpoint Security does not log ObjectProcessed type events.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, Kaspersky Endpoint Security logs ObjectNotProcessed type events.

If this check box is cleared, Kaspersky Endpoint Security does not log ObjectNotProcessed type events.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, Kaspersky Endpoint Security logs PackedObjectDetected type events.

If this check box is cleared, Kaspersky Endpoint Security does not log PackedObjectDetected type events.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, Kaspersky Endpoint Security scans only new or modified since the last scan files.

If the check box is cleared, Kaspersky Endpoint Security scans files regardless to the date of creation or modification.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

Page top

[Topic 210480]

Action on threat detection window

In this window, you can configure actions to be performed by Kaspersky Endpoint Security on detected infected objects:

File Threat Protection settings

Setting

Description

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Block access to the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Block access to the object (default value).

Page top

[Topic 210495]

Exclusion scopes

Scan exclusion is a set of conditions. When these conditions are met, Kaspersky Endpoint Security does not scan the objects for viruses and other malware. You can also exclude objects from scans by masks and threat names.

Settings of scan exclusions

Group of settings

Description

Exclusions

This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window. In this window, you can define the list of scopes to be excluded from scans.

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window. In this window, you can configure the exclusion of objects from scans by name mask.

Exclusions by threat name

This group of settings contains the Configure button, which opens the Exclusions by threat name window. In this window, you can configure the exclusion of objects from scans based on threat name.

Page top

[Topic 210496]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 248964]

<New exclusion scope> window

In this window, you can add and configure scan exclusion scopes.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

The check box enables or disables exclusion of the scope from scan when the application is running.

If this check box is selected, the application excludes this area during scans.

If this check box is cleared, the application includes this area in the scan scope. You can later exclude this scope by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the exclusion scope.

In the drop-down list of file systems, you can select the type of file system of the directories to be excluded from scans:

  • Local, for local directories.
  • Mounted – mounted directories.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

If Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want add to the exclusion scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are only applied to objects in the directory specified in the path field.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202281]

Exclusions by mask window

You can configure the exclusion of objects from scans based on name mask. The application will not scan files whose names contain the specified mask. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 202282]

Exclusions by threat name window

You can configure the exclusion of objects from scans based on threat name. The application will not block the specified threats. By default, the list of threat names is empty.

You can add, edit, and delete threat names.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected threat from the exclusion list.

This button is available if at least one threat name is selected in the list.

Clicking the threat name in the table opens the Threat name window. In this window, you can edit the name of the threat to be excluded from a scan.

Clicking the Add button opens the Threat name window. In this window, you can define the name of the threat to be excluded from a scan.

Page top

[Topic 197971]

Exclusions by process

You can exclude process activity from scans. The application does not scan the activity of the indicated processes. You can also exclude the files modified by the indicated processes.

The Exclusions by process settings group contains a Configure button, which opens the Exclusions by process window. In this window, you can define the list of exclusion scopes for exclusion by process.

Page top

[Topic 249196]

Exclusions by process window

The table contains the exclusion scopes for exclusion by process The exclusion scope for exclusion by process lets you exclude from scans the activity of the indicated process and files modified by the indicated process. By default, the table includes two exclusion scopes that contain paths to the Network Agents. You can remove these exclusions, if necessary.

Exclusion scope settings for exclusion by process

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Full path to excluded process.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

You can also import the list of exclusions from a file by clicking Advanced -> Import and export the list of added exclusions to a file by clicking Advanced -> Export selected or Advanced -> Export all.

Page top

[Topic 248958]

Trusted process window

In this window, you can add and configure exclusion scopes for exclusion by process.

Exclusion scope settings for exclusion by process

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in a table in the Exclusions by process window.

The entry field must not be blank.

Path to excluded process

Full path to the process you want to exclude from scans.

Apply to child processes

Exclude child processes of the excluded process indicated by the Path to excluded process setting.

This check box is cleared by default.

Use this scope

The check box enables or disables this exclusion scope.

If this check box is selected, the application excludes this area during scans.

If this check box is cleared, the application includes this area in the scan scope. You can later exclude this scope by selecting the check box.

The check box is selected by default.

Path to modified files

This group of settings lets you set scan exclusions for files modified by the process.

In the drop-down list of file systems, you can select the type of file system of the directories to be excluded from scans:

  • Local, for local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

If Mounted or Shared is selected in the drop-down list of file systems, then you can select the remote access protocol in the drop-down list of access protocols:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want add to the exclusion scope. You can use masks to specify the path. The entry field must not be blank.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are only applied to objects in the directory specified in the Path to modified files field.

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 210500]

Firewall Management

The operating system's firewall protects personal data stored on the user's device by blocking most threats to the operating system when the device is connected to the Internet or local network.

The operating system's firewall can detect all network connections on the user's device and provide a list of their IP addresses. The Firewall Management task lets you set the status of these network connections by configuring network packet rules.

This feature is not supported in the KESL container.

Configuring network packet rules lets you specify the desired level of the device protection, from blocking Internet access for all applications to allowing unlimited access. All outbound connections are allowed by default, unless corresponding blocking rules for the Firewall Management task are specified.

It is recommended to disable other operating system firewall management tools before enabling the Firewall Management component.

Firewall Management settings

Setting

Description

Enable Firewall Management

This check box enables or disables Firewall Management.

This check box is cleared by default.

Network packet rules

This group of settings contains the Configure button. Clicking this button opens the Network packet rules window. In this window, you can configure network packet rules that are applied by the Firewall Management component when it detects the network connection attempt.

Available networks

This group of settings contains the Configure button. Clicking this button opens the List of available networks window. In this window, you can configure the list of networks that the Firewall Management component will monitor.

Incoming connections

In this drop-down list, you can select the action to be performed for incoming network connections:

  • Allow network connections (default value).
  • Block network connections.

Incoming packets

In this drop-down list you can select the action to be performed for incoming packets:

  • Allow incoming packets (default value).
  • Block incoming packets.

Always add allowing rules for Network Agent ports

This check box enables or disables automatic adding allowing rules for Network Agent ports.

The check box is selected by default.

Page top

[Topic 202312]

Network packet rules window

The Network packet rules table contains network packet rules that the Firewall Management component uses for network activity monitoring. You can configure the settings described in the table below for network packet rules.

Network packet rules settings

Setting

Description

Name

Network packet rule name.

Action

Action to be performed by Firewall Management when it detects the network activity.

Local address

Network addresses of devices that have Kaspersky Endpoint Security installed and can send and/or receive network packets.

Remote address

Network addresses of remote devices that can send and/or receive network packets.

Logging

This column shows if the application logs actions of the network packet rule.

If the value is Yes, the application logs the actions of the network packet rule.

If the value is No, the application does not log the actions of the network packet rule.

By default, the table of network packet rules is empty.

You can add, edit, delete, move up, and move down network packet rules in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210510]

Added network packet rule window

In this window, you can configure the added network packet rule settings.

Network packet rule settings

Setting

Description

Protocol

You can select the type of data transfer protocol for which you want to monitor network activity:

  • Any (default value)
  • GRE
  • ICMP
  • ICMPv6
  • IGMP
  • TCP
  • UDP

Direction

You can specify the direction of network activity being monitored:

  • Incoming packets. If this option is selected, the Firewall Management component monitors incoming packets.
  • Incoming. If this option is selected, the Firewall Management component monitors incoming network activity.
  • Incoming/Outgoing. If this option is selected, the Firewall Management component monitors both incoming and outgoing network activity.
  • Incoming/Outgoing packets. If this option is selected, the Firewall Management component monitors both incoming and outgoing packets.
  • Outgoing packets. If this option is selected, the Firewall Management component monitors outgoing packets.
  • Outgoing. If this option is selected, the Firewall Management component monitors outgoing network activity.

ICMP type

You can specify the ICMP type. The Firewall Management component monitors messages of the specified type sent by the host or gateway.

If the Specified option is selected, the field for entering the ICMP type will be displayed.

This window is displayed if the ICMP or ICMPv6 data transfer protocol is selected in the Protocol drop-down list.

ICMP code

You can specify the ICMP code. The Firewall Management component monitors messages of the type specified in the ICMP type field, with the code specified in the ICMP code field, and sent by the host or gateway.

If the Specified option is selected, the field for entering the ICMP code will be displayed.

This window is displayed if the ICMP or ICMPv6 data transfer protocol is selected in the Protocol drop-down list.

Remote ports

You can specify the port numbers of the remote devices between which the connection is to be monitored.

If the Specified option is selected, the field for entering the port numbers will be displayed.

This window is displayed only if TCP or UDP data transfer protocol is selected in the Protocol drop-down list.

Local ports

You can specify the port numbers of the local devices between which the connection is to be monitored.

If the Specified option is selected, the field for entering the port numbers will be displayed.

This window is displayed only if TCP or UDP data transfer protocol is selected in the Protocol drop-down list.

Remote addresses

You can specify the network addresses of the remote devices that can send and receive network packets:

  • Any address (default value). If this item is selected, the network rule controls network packets sent and/or received by remote devices with any IP address.
  • Specified address. If this item is selected, the network rule controls the sending and receiving of network packets by remote devices with the IP addresses that are specified in the field below.
  • By network type. If this item is selected, the network rule controls network packets sent and received by remote devices with the IP addresses associated with the selected network type: Public networks, Local networks, or Trusted networks.

Local addresses

You can specify the network addresses of the devices with Kaspersky Endpoint Security installed that can send and receive network packets:

  • Any address (default value). If this option is selected, the network rule controls network packets sent and/or received by the devices with Kaspersky Endpoint Security installed regardless of their IP address.
  • Specified address. If this option is selected, the network rule controls the network addresses of devices with Kaspersky Endpoint Security installed that can send and receive network packets. These network addresses are specified in the field below.

Action

You can select an action to be performed by the Firewall Management component when it detects network activity:

  • Block network activity.
  • Allow network activity (default value).

Logging

You can specify whether the actions of the network rule will be logged in the report.

Rule name

The field for entering the name of the network packet rule.

Page top

[Topic 210497]

Available networks window

The Available networks table contains the networks controlled by the Firewall Management component. The table of available networks is empty by default.

Available networks settings

Setting

Description

IP address

Network IP address.

Network type

Network type (Public network, Local network, or Trusted network).

You can add, edit, and delete available networks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 214875]

Network connection window

In this window, you can configure the network connection that the Firewall Management component will monitor.

Network connection

Setting

Description

IP address

The field for entering IP address of the network.

Network type

You can select the type of the network:

  • Public
  • Local
  • Trusted

     

Page top

[Topic 234618]

Web Threat Protection

While the Web Threat Protection component is running, Kaspersky Endpoint Security scans inbound traffic and prevents downloads of malicious files from the Internet and also blocks phishing, adware, or other malicious websites.

This feature is not supported in the KESL container.

The application scans HTTP, HTTPS, and FTP traffic. Also, the application scans websites and IP addresses. You can specify the network ports or network port ranges to be monitored.

To monitor HTTPS traffic, enable encrypted connection scans. To monitor FTP traffic, select the Monitor all network ports check box.

Web Threat Protection settings

Setting

Description

Enable Web Threat Protection

This check box enables or disables Web Threat Protection.

This check box is cleared by default.

Trusted web addresses

This group of settings contains the Configure button, which opens the Trusted web addresses window, where you can specify the list of trusted web addresses. Kaspersky Endpoint Security will not scan the contents of websites whose web addresses are included in this list.

Action on threat detection

Action that the application performs on a web resource where a dangerous object is detected:

  • Block access to all dangerous objects detected in web traffic, display a notification about the blocked access attempts, and log information about the dangerous objects (default value).
  • Inform the user when a dangerous object is detected in web traffic. Web Threat Protection allows this object to be downloaded to the device. At that, the application logs the information about the dangerous object and adds it to the list of active threats.

Scan settings

This group of settings contains the Configure button, which opens the Scan settings window, where you can configure the settings for scanning incoming traffic.

Page top

[Topic 210555]

Trusted web addresses window

In this window, you can add web addresses and web pages whose content you consider trusted.

You can only add HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses. By default, the list is empty.

When creating an address mask, use an asterisk (*) as a placeholder for one or more characters. If you enter the *abc* address mask, it is applied to all web resources that contain the "abc" sequence (for example, www.virus.com/download_virus/page_0-9abcdef.html). To include the asterisk in the address mask as a character, but not as a mask, enter the * character twice (for example, www.virus.com/**/page_0-9abcdef.html means www.virus.com/*/page_0-9abcdef.html).

You can add, edit, and remove web addresses on the list.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202328]

Web address window

In this window, you can add a web address or a web address mask to the list of trusted web addresses.

You can add only HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses.

When creating an address mask, use an asterisk (*) as a placeholder for one or more characters. If you enter the *abc* address mask, it is applied to all web resources that contain the "abc" sequence (for example, www.virus.com/download_virus/page_0-9abcdef.html). To include the asterisk in the address mask as a character, but not as a mask, enter the * character twice (for example, www.virus.com/**/page_0-9abcdef.html means www.virus.com/*/page_0-9abcdef.html).

Page top

[Topic 210554]

Scan settings window

In this window, you can configure the settings for scanning incoming traffic during operation of the Web Threat Protection component.

Web Threat Protection settings

Setting

Description

Detect malicious objects

This check box enables or disables checking of links against the databases of malicious web addresses.

The check box is selected by default.

Detect phishing links

This check box enables or disables checking of links against the databases of phishing web addresses.

The check box is selected by default.

Use heuristic analysis for detecting phishing links

This check box enables or disables the use of heuristic analysis for detecting phishing links.

This check box is available if the Detect phishing links check box is selected, and is selected by default.

Detect adware

This check box enables or disables checking links against the databases of adware web addresses.

This check box is cleared by default.

Detect legitimate applications that may be used by hackers to harm devices or data

This check box enables or disables checking links against the databases of legitimate applications that can be used by hackers to harm devices or data.

This check box is cleared by default.

Page top

[Topic 16393]

Network Threat Protection

While the Network Threat Protection component is running, the application scans inbound network traffic for activity that is typical for network attacks. Network Threat Protection is started by default when the application starts.

This feature is not supported in the KESL container.

The application receives the numbers of the TCP ports from the current application databases and scans incoming traffic for these ports. Upon detecting an attempt of a network attack that targets your device, the application blocks network activity from the attacking device and logs an event about the detected network activity.

To scan network traffic, the Network Threat Protection task receives port numbers from the application databases and accepts connections via all these ports. During the network scan process, it may look like an open port on the device, even if no application on the system is listening to this port. It is recommended to close unused ports by means of a firewall.

Network Threat Protection settings

Setting

Description

Enable Network Threat Protection

This check box enables or disables Network Threat Protection.

The check box is selected by default.

Action on threat detection

Actions performed upon detection of network activity that is typical of network attacks.

  • Inform user. The application allows network activity and logs information about detected network activity.
  • Block network activity from an attacking device and log information about detected network activity (default value).

Block attacking devices

This check box enables or disables the blocking of network activity when a network attack attempt is detected.

The check box is selected by default.

Block the attacking device for (min)

In this field you can specify the duration an attacking device is blocked in minutes. After the specified time, Kaspersky Endpoint Security allows network activity from this device.

Available values: integer from 1 to 32768.

Default value: 60.

Exclusions

This group of settings contains the Configure button, which opens the Exclusions window, where you can specify a list of IP addresses. Network attacks from these IP addresses will not be blocked.

Page top

[Topic 210559]

Exclusions window

In this window, you can add IP addresses from which network attacks will not be blocked.

By default, the list is empty.

You can add, edit, and remove IP addresses in the list.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202336]

IP address window

In this window, you can add and edit IP addresses. Network attacks from these IP addresses will not be blocked by Kaspersky Endpoint Security.

IP addresses

Setting

Description

Enter an IP address

Entry field for an IP address.

You can specify IP addresses in IPv4 and IPv6 formats.

Page top

[Topic 246798]

Kaspersky Security Network

To increase the protection of devices and user data, Kaspersky Endpoint Security can use Kaspersky cloud-based knowledge base Kaspersky Security Network (KSN) to check the reputation of files, Internet resources, and software. Using Kaspersky Security Network data ensures a faster response to various threats, high protection component performance, and fewer false positives.

Use of Kaspersky Security Network is voluntary. Kaspersky Endpoint Security prompts you to enable KSN usage during installation. You can start or stop using KSN at any time.

Kaspersky Security Network infrastructure solutions

Kaspersky Endpoint Security supports the following infrastructure solutions to work with Kaspersky reputation databases:

  • Kaspersky Security Network (KSN) – A solution that receives information from Kaspersky and sends data about objects detected on user devices to Kaspersky for additional verification by Kaspersky analysts and to add to reputation and statistical databases.
  • Kaspersky Private Security Network (KPSN) – A solution that allows users of devices with Kaspersky Endpoint Security installed to access the reputation databases of Kaspersky, as well as other statistical data, without sending data to Kaspersky from their devices. KPSN is designed for corporate clients who can't use Kaspersky Security Network, for example, for the following reasons:
    • No connection of local workplaces to the Internet
    • Legal prohibition or corporate security restrictions on sending any data outside the country or the organization's local network

After changing the Kaspersky Endpoint Security license, submit the details of the new key to the service provider in order to be able to use KPSN. Otherwise, an authentication error will prevent data exchange with KPSN.

Kaspersky Security Network usage options:

There are two options for using KSN:

  • Extended KSN mode – you can receive information from the Kaspersky knowledge base, while Kaspersky Endpoint Security automatically sends statistical information to Kaspersky Security Network that it obtained during its operation. The application can also send to Kaspersky for additional scanning certain files (or parts of files) that intruders can use to harm the device or data.
  • Basic KSN mode – you can receive information from the Kaspersky knowledge base, but Kaspersky Endpoint Security does not send anonymous statistics and data about the types and sources of threats.

You can select a different Kaspersky Security Network usage option at any time.

No personal data is collected, processed, or stored. Detailed information about the storage, and destruction, and/or submission to Kaspersky of statistical information generated during participation in KSN is available in the Kaspersky Security Network Statement and on Kaspersky's website. You can read the text of the Kaspersky Security Network Statement in the Kaspersky Security Network Statement window, which can be opened by clicking the Kaspersky Security Network Statement link.

Cloud mode for Kaspersky Endpoint Security

If Kaspersky Endpoint Security is used in standalone mode and you are using KSN in the application, you can enable cloud mode. Cloud mode is an operating mode of Kaspersky Endpoint Security that uses a lightweight version of the malware databases. This lets you reduce the load on device memory.

Kaspersky Security Network facilitates the application's use of the lightweight malware databases.

If you plan to use cloud mode, make sure KSN is available on your device. Kaspersky Security Center displays information about the availability of KSN via the client device status (OK, Critical, Warning) in the list of managed devices on the Devices tab.

Kaspersky Endpoint Security switches to using a lightweight version of the malware databases after enabling cloud mode and performing the latest update of the application databases and modules. If you are not using KSN or cloud mode is disabled, Kaspersky Endpoint Security downloads the full version of the application databases from Kaspersky servers during the next update of application databases and modules.

Cloud mode is disabled automatically if use of KSN is disabled.

If Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments, use of the lightweight malware databases is not supported. Kaspersky Endpoint Security receives special databases necessary for the operation of the Light Agent from the Protection Server.

Using the KSN Proxy service

User devices managed by Kaspersky Security Center Administration Server can interact with KSN via the KSN Proxy service.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KSN Proxy service facilitates interaction with the KSN infrastructure. If the KSN proxy is not available, KSN is not used by the application.

You can configure the KSN proxy server settings in the Kaspersky Security Center Administration Server properties. For details about the KSN proxy server, refer to the Kaspersky Security Center Help.

Kaspersky Security Network settings

Setting

Description

Kaspersky Security Network Statement

Clicking this link opens the Kaspersky Security Network Statement window. In this window, you can read the text of the Kaspersky Security Network Statement.

Kaspersky Security Network (KSN)

This block displays information about the KSN mode or indicates that KSN is not used by Kaspersky Endpoint Security.

The Edit button opens a window where you can configure the use of Kaspersky Security Network.

Enable cloud mode

The check box enables or disables the operating mode in which Kaspersky Endpoint Security uses a lightweight version of the malware databases.

The check box is available if use of KSN is enabled.

The check box is selected if, when creating a policy, you accepted the terms of the Kaspersky Security Network Statement and are using KSN in extended mode.

The mode is enabled or disabled after the next application database update.

This setting applies only if the application is used in standalone mode.

Use KSN servers when KSN Proxy is not available

The check box enables or disables the ability to communicate with KSN servers directly when the KSN Proxy service is unavailable.

The check box is selected by default.

This setting applies only if the application is used in standalone mode.

Page top

[Topic 246799]

Kaspersky Security Network settings

In this window, you can configure Kaspersky Security Network participation settings.

Kaspersky Security Network settings

Setting

Description

More info

Clicking this link opens the Kaspersky website.

Do not use Kaspersky Security Network

By selecting this option, you decline to use Kaspersky Security Network.

Basic KSN mode

By selecting this option, you accept the terms of using Kaspersky Security Network. You will be able to receive information from Kaspersky's online knowledge base about the reputation of files, web resources, and software.

Extended KSN mode

By selecting this option, you accept the terms of using Kaspersky Security Network. You will be able to receive information from Kaspersky's online knowledge base about the reputation of files, web resources, and software. Also, anonymous statistics and information about the types and sources of various threats will be sent to Kaspersky to improve Kaspersky Security Network.

Kaspersky Security Network Statement

This link opens the Kaspersky Security Network Statement window, where you can read the text of the Kaspersky Security Network Statement.

Page top

[Topic 246800]

Kaspersky Security Network Statement

In this window, you can read the text of the Kaspersky Security Network Statement and accept its terms and conditions.

Kaspersky Security Network settings

Setting

Description

I confirm that I have fully read, understand, and accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you want to use the Kaspersky Security Network, and you have fully read, understood, and accept the terms and conditions of the Kaspersky Security Network Statement that is displayed.

This option is available if you selected the Basic KSN mode or Extended KSN mode option in the Kaspersky Security Network settings window.

I do not accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you do not want to use Kaspersky Security Network.

This option is available if you selected the Basic KSN mode or Extended KSN mode option in the Kaspersky Security Network settings window.

Page top

[Topic 246801]

Kaspersky Private Security Network Statement

In this window, you can read the text of the Kaspersky Private Security Network Statement and accept its terms and conditions.

Kaspersky Security Network settings

Setting

Description

I confirm that I have fully read, understand, and accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you want to participate in the Kaspersky Security Network, and you have fully read, understood, and accept the terms and conditions of the Kaspersky Private Security Network Statement that is displayed.

I do not accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you do not want to use Kaspersky Security Network.

Page top

[Topic 246002]

Application Control

During execution of the Application Control task, Kaspersky Endpoint Security controls the launching of applications on user devices. This helps reduce the risk of device infection by restricting access to applications. Application launching is regulated by Application Control rules.

To use the component, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

Application Control can operate in two modes:

  • Denylist. In this mode Kaspersky Endpoint Security allows all users to launch any applications that are not specified in the Application Control rules. This is the default operation mode of the Application Control component.
  • Allowlist. In this mode Kaspersky Endpoint Security prevents all users from launching any applications that are not specified in the Application Control rules.

For each Application Control mode, separate rules can be created and an action can be specified: apply rules or notify about an attempt to start an application that matches the rules. Kaspersky Endpoint Security performs this action when it detects an attempt to start an application.

The Application Control settings are described in the following table.

Application Control settings

Setting

Description

Enable Application Control

The check box enables the Application Control component.

This check box is cleared by default.

Action on application startup attempt

The action that Kaspersky Endpoint Security performs upon detecting an attempt to start an application that matches the configured rules:

  • Apply rules (default value). If you select this option, Kaspersky Endpoint Security applies Application Control rules and performs the action specified in the rules.
  • Inform (test mode). If you select this option, Kaspersky Endpoint Security tests the rules and generates an event about an attempt to start an application that matches the rules.

Application Control mode

Application Control task operation mode:

  • Allowlist. If you select this option, Kaspersky Endpoint Security prevents all users from launching any applications except those specified in the Application Control rules.
  • Denylist (default value). If you select this option, Kaspersky Endpoint Security allows all users to launch any applications except those specified in the Application Control rules.

Application Control rules

This group of settings contains the Configure button. Clicking this button opens the Application Control rules window.

Page top

[Topic 246003]

Application Control rules window

The Application Control rules table contains the rules used by the Application Control component. The Application Control rules table is empty by default.

Application Control rules settings

Setting

Description

Category name

The name of the application category that is used by the rule.

Status

Operation status of the Application Control rule:

  • Enabled – the rule is enabled, Application Control applies this rule during operation.
  • Disabled – the rule is disabled and is not used when the Application Control is running.
  • Test – Application Control allows launching applications that meet the rule criteria, but logs information about launches of these applications in the report.

You can change the rule status in the Add new rule window.

You can add, modify and remove Application Control rules.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 246004]

Adding rule window

In this window, you can configure the settings for the Application Control rule.

Adding the Application Control rule

Setting

Description

Description

Description of the Application Control rule.

Rule status

In the drop-down list, you can select the status of the Application Control rule:

  • Enabled – the rule is enabled, Application Control applies this rule during operation.
  • Disabled – the rule is disabled and is not used when the Application Control is running.
  • Test – Application Control allows launching applications that meet the rule criteria, but logs information about launches of these applications in the report.

Category

The group of settings contains the Configure button. Clicking this button opens the Application categories window.

Users and their rights

The table contains a list of users or user groups to which the Application Control rule applies, and the types of access assigned to them, and consists of the following columns:

  • User or group name – names of users or names of user groups to which the Application Control rule applies.
  • Access – the type of access: Allow launching the applications or Block launching the applications.

     

You can add, edit, and delete users or user groups.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 246005]

Application categories window

In this window, you can add a new category or configure the category settings for an Application Control rule.

Kaspersky Endpoint Security does not support use of the KL categories of Kaspersky Security Center.

Application Control categories

Setting

Description

Category name

List of the added Application Control categories.

Add

Clicking the button starts the category creation wizard. Follow the instructions of the Wizard.

For details about creating a category, refer to the Kaspersky Security Center Help.

Edit

Clicking this button opens the category properties window, where you can change the category settings. The Golden Image (local) category cannot be edited.

Page top

[Topic 246006]

User or group window

In this window, you can specify a local or domain user or user group for which you want to configure a rule.

Adding the Application Control rule

Setting

Description

Type

The User or Group to which the Application Control rule applies.

User or group name

Name of the user or user group to which the Application Control rule applies.

Access

Access type: Allow launching the applications or Block launching the applications.

Page top

[Topic 210666]

Anti-Cryptor

Anti-Cryptor allows you to protect your files in local directories with network access by SMB/NFS protocols from remote malicious encryption.

While the Anti-Cryptor component is running, Kaspersky Endpoint Security scans remote devices calls to access the files located in the shared network directories of the protected device. If the application considers a remote device actions on network file resources to be malicious encrypting, this device is added to a list of untrusted devices and loses access to the shared network directories. The application does not consider activity to be malicious encryption if it is detected in the directories excluded from the protection scope of the Anti-Cryptor component.

This feature is not supported in the KESL container.

To use the component, a license that includes the corresponding function is required.

For the Anti-Cryptor component to operate correctly, at least one of the services (Samba or NFS) must be installed in the operating system. For the NFS service, the rpcbind package must be installed.

Anti-Cryptor operates correctly with the SMB1, SMB2, SMB3, NFS3, TCP/UDP, and IP/IPv6 protocols. Working with NFS2 and NFS4 protocols is not supported. It is recommended to configure your server settings so that the NFS2 and NFS4 protocols cannot be used to mount resources.

Anti-Cryptor does not block access to network file resources until the device activity is identified as malicious. So, at least one file will be encrypted before the application detects malicious activity.

Anti-Cryptor settings

Setting

Description

Enable Anti-Cryptor

This check box enables or disables the protection of files in local directories with network access by SMB/NFS protocols from remote malicious encryption.

This check box is cleared by default.

Protection scopes

This group of settings contains buttons that open the windows where you can configure scan scopes and protection settings.

Exclusions

This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window. In this window, you can define the list of scopes to be excluded from scans.

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window. In this window, you can configure the exclusion of objects from scans by name mask.

Page top

[Topic 202257_1]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Scan scope settings

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 210668]

<New scan scope> window

In this window, you can add or configure protection scope for the Anti-Cryptor component.

Protection scope settings

Setting

Description

Scope name

Field for entering the protection scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this protection scope during the component operation.

If this check box is cleared, the application does not process this protection scope during the component operation. You can later include this scope in the component operation settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the scan scope.

You can select the file system type in the drop-down list of file systems:

  • Local, for local directories.
  • Shared displays server file system resources accessible via the Samba or NFS protocol.
  • All shared (default value) displays all server file system resources accessible via the Samba and NFS protocols.

If Shared is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want to add to the protection scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

Masks

This list contains name masks of the objects that the application scans during operation of the Anti-Cryptor component.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210670]

Protection settings window

Protection settings

Setting

Description

Enable untrusted hosts blocking

This check box enables or disables untrusted hosts blocking.

The check box is selected by default.

Block untrusted host for (min)

In this field you can specify the untrusted host blocking duration in minutes. After the specified time, Kaspersky Endpoint Security removes the untrusted devices from the list of blocked devices. The access of the host to network file resources is restored automatically, after it is deleted from the list of untrusted hosts.

If a compromised host is blocked and you change this setting value, the blocking time for this host will not change. The blocking time is not a dynamic value, and it is calculated at the moment of blocking.

Available values: integer from 1 to 4294967295.

Default value: 30.

Page top

[Topic 210496_1]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 248964_1]

<New exclusion scope> window

In this window, you can add and configure scan exclusion scopes.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

The check box enables or disables exclusion of the scope from scan when the application is running.

If this check box is selected, the application excludes this area during scans.

If this check box is cleared, the application includes this area in the scan scope. You can later exclude this scope by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the exclusion scope.

In the drop-down list of file systems, you can select the type of file system of the directories to be excluded from scans:

  • Local, for local directories.
  • Mounted – mounted directories.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

If Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want add to the exclusion scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are only applied to objects in the directory specified in the path field.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202281_1]

Exclusions by mask window

You can configure the exclusion of objects from scans based on name mask. The application will not scan files whose names contain the specified mask. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 210733]

System Integrity Monitoring

System Integrity Monitoring is designed to track the actions performed on files and directories in the monitoring scope specified in the component operation settings. You can use System Integrity Monitoring to track the file changes that may indicate a security breach on a protected device.

To use the component, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

System Integrity Monitoring settings

Setting

Description

Enable System Integrity Monitoring

This check box enables or disables System Integrity Monitoring.

This check box is cleared by default.

Monitoring scopes

The group of settings contains the Configure button. Clicking this button opens the Scan scopes window.

Monitoring exclusions

This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window.

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window.

Page top

[Topic 202408]

Scan scopes window

The table contains monitoring scopes for the System Integrity Monitoring component. The application monitors files and directories located in the paths specified in the table. By default, the table contains one monitoring scope, Kaspersky internal objects (/opt/kaspersky/kesl/).

Monitoring scope settings

Setting

Description

Scope name

Monitoring scope name.

Path

Path to the directory that the application protects.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes, in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 202409]

<New scan scope> window

In this window, you can add and configure monitoring scopes for the System Integrity Monitoring component.

Monitoring scope settings

Setting

Description

Scan scope name

Field for entering the monitoring scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application controls this monitoring scope during the application's operation.

If this check box is cleared, the application does not control this monitoring scope during the operation. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the monitoring scope.

The field must not be blank. The default path is /opt/kaspersky/kesl.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202410]

Exclusion scopes window

The table contains monitoring exclusion scopes for the System Integrity Monitoring component. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from monitoring.

Status

Indicates whether the application excludes this scope from monitoring during the component operation.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202411]

<Exclusion scope name> window

In this window, you can add or configure the monitoring exclusion scope for the System Integrity Monitoring component.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window. The entry field must not be blank.

Use this scope

The check box enables or disables the exclusion of the scope from monitoring when the application is running.

If this check box is selected, the application excludes this scope from monitoring during the component operation.

If this check box is cleared, the application monitors this scope during the component operation. You can later exclude this scope from monitoring by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to add to the exclusion scope. The field must not be blank.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Masks

The list contains name masks of the objects that the application excludes from the monitoring.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202412]

Exclusions by mask window

You can configure the exclusion of objects from monitoring based on name masks. The application does not scan the files with the names containing the specified masks. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 197225]

Device Control

While the Device Control component is running, Kaspersky Endpoint Security manages user access to the devices that are installed on or connected to the client device (for example, hard drives, cameras, or Wi-Fi modules). This lets you protect the client device from infection when external devices are connected, and prevent data loss or leaks. Device Control manages user access to devices using the access rules.

This feature is not supported in the KESL container.

When access to a device is denied by the Device Control task, and such a device connects to the client device, the application denies access to the device to users specified in the rule and displays a notification. During attempts to read and write on this device, the application silently blocks the users specified in the rule from reading/writing.

Device Control settings

Setting

Description

Enable Device Control

This check box enables or disables Device Control.

The check box is selected by default.

Trusted devices

This group of settings contains the Configure button. Clicking this button opens the Trusted devices window. In this window, you can add a device to a list of trusted devices by the device ID or by selecting it from the list of devices detected on the client devices.

Device Control action

Action performed by the application when an attempt is made to access a device to which access is denied in accordance with the access rule:

  • Apply rules (default value). If you select this option, the application uses the access rules and performs the action specified in the rules.
  • Test rules. If you select this option, the application tests the access rules and generates an event about the detection of an attempt to access a device.

Device Control settings

This group of settings contains buttons that open windows where you can configure access rules for various types of devices as well as connection bus access rules.

Page top

[Topic 246336]

Trusted devices window

The table contains a list of trusted devices. The table is empty by default.

Trusted device settings

Setting

Description

Device ID

ID of a trusted device.

Device name

Name of a trusted device.

Device type

Trusted device type (for example, Hard drive or Smart card reader).

Host name

Name of the client device the trusted device is connected to.

Comment

Comment related to a trusted device.

You can add a device to the list of trusted devices by ID or by mask or by selecting the required device in the list of devices detected on the user device.

You can edit and delete trusted devices in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

You can also import the list of devices from a file by clicking Advanced -> Import and export the list of added devices to a file by clicking Advanced -> Export selected or Advanced -> Export all. When importing, you will be prompted to replace the list of trusted devices or add the devices to the existing list.

Page top

[Topic 246337]

Trusted device window

In this window, you can add a device to the list of trusted devices by its identifier.

Adding device by ID

Setting

Description

Device ID

The field for entering the identifier or the identifier mask of the device that you want to add to the list of trusted devices.

To specify an identifier, you can use the following wildcards: * (any sequence of characters) or ? (any single character). For example, you can specify the USBSTOR* mask to allow access to all USB drives.

Find on hosts

Clicking the button displays the devices found on the connected client devices using the specified ID or mask. The button is available if the Device ID field is not empty.

Devices found

The table contains the following columns:

  • Device type – type of device found (for example, Hard drive or Smart card reader).
  • Device ID – ID of the device found.
  • Device name – name of the device found.
  • Host name — name of the client device that the found device is connected to.

Comment

The field for entering a comment for the device that you want to add to the list of trusted devices (optional).

Page top

[Topic 246338]

Device window on client devices

In this window you can add a device to the list of trusted devices by selecting it in the list of existing devices detected on client devices.

Information about existing devices is available only if there is an active policy and there has been synchronization with the Network Agent (performs within the limits specified in the Network Agent policy, 15 minutes by default). If you create a new policy and there are no other active ones, the list will be empty.

Adding device from list

Setting

Description

Host name

Field for entering the name or the name mask for the managed device for which you want to find connected devices. The default mask is * – all managed devices.

Device type

In this drop-down list, you can select the type of connected device to search for (for example, Hard drives or Smart card readers). The All devices option is selected by default.

Device ID

Field for entering the identifier or identifier mask for the device you want to find. The default mask is * – all devices.

Find on hosts

When you click this button, the application searches the device with the specified settings. The search results are displayed in the table below.

Page top

[Topic 210746]

Device type window

In this window, you can configure access mode for various types of devices.

Access mode for device types

Setting

Description

Device type

Device type (for example, Hard drives, Printers).

Access

Device access mode. Right-clicking with the mouse opens a context menu where you can select one of the following options:

  • Allow: allow access to devices of the selected type.
  • Block: prohibit access to devices of the selected type.
  • Depends on bus (default value): allow or block access to the devices depending on the access rule for a connection bus.
  • By rule – allow or block access to devices, depending on the access rule and schedule.

In the Configuring device access rule window, which opens by double-clicking the device type, you can configure access rules and access schedules for devices to which access with restrictions is allowed.

Page top

[Topic 210761]

Configure device access rule window

In this window, you can configure access rules and schedules for the selected device type.

This window is opened by double-clicking the device type in the Device type window.

Device access rules and schedules

Setting

Description

Users and/or user groups

The list contains users and groups for which you can configure access schedule.

By default, the table contains the \Everyone item (all users).

You can add, edit, and delete users or user groups.

Rules for the selected user group by access schedules

This table contains access schedules for users and user groups. It consists of the following columns:

  • Access schedule – names of existing access schedules. The check box next to the schedule indicates whether this schedule is used by the component.
  • Access – access type for the schedule: Allow (grant access to devices of the selected type) or Block (deny access to devices of the selected type).

You can configure schedules only for hard drives, removable drives, floppy disks, and CD/DVD drives. By default, the table contains the Default access schedule, which provides all users with full access to devices (the \Everyone item is selected in the Users and/or user groups list) at any time if access via the connection bus is allowed for this type of device.

You can add, edit, and delete access schedules for the selected users. The Default schedule cannot be modified or removed.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 247137]

User or group window

In this window, you can specify a user or group of users to which the device access rule applies.

Configure device access rule

Setting

Description

Type

The User or Group to which the Application Control rule applies.

User or group name

Name of a local or domain user (without specifying the full name with the domain, if the system allows entering user names in this format, or in the <domain name>\<user name> or <user name>@<domain name>) format, or the name of a group of users to which the rule applies.

Page top

[Topic 202424]

Schedule for access to devices window

In this window, you can configure the device access schedule. You can configure schedules only for hard drives, removable drives, floppy disks, and CD/DVD drives.

In the General settings -> Application settings section, if the Block access to files during scanning check box is cleared, then it is not possible to block access to devices using a device access schedule.

Schedule for access to devices

Setting

Description

Name

Entry field for the access schedule name.

Time intervals

The table where you can select time intervals for the schedule (days and hours).

Intervals highlighted in green are included to the schedule.

To exclude an interval from the schedule, click the corresponding cells. Intervals excluded from the schedule are highlighted in gray.

By default, all intervals (24/7) are included to the schedule.

Page top

[Topic 246341]

Connection buses window

In this window, you can configure access rules for connection buses.

Connection rules for buses

Setting

Description

Connection bus

Connection bus used to connect the device to the client device:

  • FireWire
  • USB

Access

Connection bus access rule. Right-clicking opens a context menu where you can select one of the following options:

  • Allow (default value): provide access to the devices connected using this connection bus.
  • Block: deny access to the devices connected using this connection bus.

Page top

[Topic 237053]

Behavior Detection

By default, the Behavior Detection component starts when Kaspersky Endpoint Security starts and monitors the malicious activity of the applications in the operating system. When malicious activity is detected, Kaspersky Endpoint Security can terminate the process of the application that performs malicious activity.

This feature is not supported in the KESL container.

Behavior Detection component settings

Setting

Description

Enable Behavior Detection

This check box enables or disables the Behavior Detection component.

The check box is selected by default.

Action on malware activity detection

The action to be performed by Kaspersky Endpoint Security upon detecting malicious activity in the operating system:

  • Block the application that performs malicious activity (default value). Kaspersky Endpoint Security terminates the process that performs malicious activity and logs information about the detected malicious activity.
  • Inform user. Kaspersky Endpoint Security does not terminate the process that performs malicious activity; it only records the detection of malicious activity in the event log.

Use exclusions by process

This check box enables or disables exclusions by process in the operation of the Behavior Detection component.

This check box is cleared by default.

The Configure button opens the Exclusions by process window. In this window, you can exclude the activity of processes.

Page top

[Topic 197974]

Exclusions by process window

The table contains the exclusion scopes for exclusion by process The exclusion scope for exclusion by process lets you exclude the activity of an indicated process. By default, the table is empty.

If integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response is enabled, exclusions by process are not applied.

Exclusion scope settings for exclusion by process

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Full path to excluded process.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

You can also import the list of exclusions from a file by clicking Advanced -> Import and export the list of added exclusions to a file by clicking Advanced -> Export selected or Advanced -> Export all. When importing, you will be prompted to replace the list of exclusions or add the exclusions to the existing list.

Page top

[Topic 237210]

Trusted process window

In this window, you can add and configure exclusion scopes for exclusion by process.

Exclusion scope settings for exclusion by process

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in a table in the Exclusions by process window.

Path to excluded process

Full path to the process you want to exclude from scans. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The entry field must not be blank.

Apply to child processes

Exclude child processes of the excluded process indicated by the Path to excluded process setting.

This check box is cleared by default.

Use this scope

The check box enables or disables this exclusion scope.

If this check box is selected, the application excludes this scope.

If this check box is cleared, the application includes this scope. You can later exclude this scope by selecting the check box.

The check box is selected by default.

Page top

[Topic 233440]

Managing tasks

You can configure the ability to view and manage Kaspersky Endpoint Security tasks on managed devices.

Task management settings

Setting

Description

Allow users to view and manage local tasks

This check box allows or blocks the users from viewing local tasks created in Kaspersky Endpoint Security and control of these tasks on the managed client devices.

This check box is cleared by default.

Allow users to view and manage tasks created through KSC

The check box allows or prohibits the users from viewing the tasks created in Kaspersky Security Center and managing these tasks on the managed client devices.

This check box is cleared by default.

Page top

[Topic 247219]

Removable Drives Scan

When the Removable Drives Scan task is running, the application scans the removable device and its boot sectors for viruses and other malware. The following removable drives are scanned: CDs, DVDs, Blu-ray discs, flash drives (including USB modems), external hard drives, and floppy disks.

This feature is not supported in the KESL container.

Removable Drives Scan task settings

Setting

Description

Enable removable drives scan when connected to the device

This check box enables or disables the scan of removable drives when they are connected to the user device.

This check box is cleared by default.

Action when a removable drive connects

In the drop-down list, you can select an action to be performed by the application upon connection of removable drives to the user device:

  • Do not scan removable drives when connected (default value).
  • Quick scan – only scan files of certain types on removable drives (except CD/DVD drives and Blu-ray discs) and do not unpack compound objects. For the quick scan, the default settings of the File Threat Protection component are used.
  • Detailed scan – scan all files on removable drives (except CD/DVD drives and Blu-ray discs). For a detailed scan, the default settings of the Malware Scan task are used.

Action on a CD / DVD drive connection

In the drop-down list, you can select an action to be performed by the application upon connection of CD/DVD drives and Blu-ray discs to the user device:

  • Do not scan CD/DVD drives and Blu-ray discs when connected (default value).
  • Quick scan – only scan files of certain types on CD/DVD drives and Blu-ray discs. For the quick scan, the default settings of the File Threat Protection component are used.
  • Detailed scan – scan all files on CD/DVD drives and Blu-ray discs. For a detailed scan, the default settings of the Malware Scan task are used.

Block access to the removable drive while scanning

This check box enables or disables blocking of files on the connected drive during execution of the Removable Drives Scan task.

This check box is cleared by default.

Page top

[Topic 202448]

Proxy server settings

You can configure proxy server settings if the users of the client devices use a proxy server to connect to the internet. Kaspersky Endpoint Security may use a proxy server to connect to Kaspersky servers, for example, when updating application databases and modules or when communicating with Kaspersky Security Network and Kaspersky Endpoint Detection and Response (KATA).

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of a proxy server for connecting to Kaspersky Security Network, the SVM, and the Integration Server is not supported.

Proxy server settings

Setting

Description

Do not use proxy server

If this option is selected, Kaspersky Endpoint Security does not use a proxy server.

Use specified proxy server settings

If this option is selected, Kaspersky Endpoint Security uses the specified proxy server settings, for example, for integration with Kaspersky Endpoint Detection and Response (KATA).

Address and port

Fields for entering the proxy server's IP address or domain name as well as its port.

Default port: 3128.

The fields are available if the Use specified proxy server settings option is selected.

Use user name and password

This check box enables or disables proxy server authentication using a user name and password.

This check box is available if the Use specified proxy server settings option is selected.

This check box is cleared by default.

When connecting via an HTTP proxy, we recommend to use a separate account that is not used to sign in to other systems. An HTTP proxy uses an insecure connection, and the account may be compromised.

User name

Entry field for the user name used for proxy server authentication.

This entry field is available if the Use user name and password check box is selected.

Password

Entry field for entering the user password for proxy server authentication.

It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

Clicking the Show button causes the user's password to be displayed in clear text in the Password field. By default, the user password is hidden and is displayed as asterisks.

The entry field and button are available if the Use user name and password check box is selected.

Use Kaspersky Security Center as a proxy server for the application activation

This check box enables or disables use of Kaspersky Security Center as a proxy server for application activation.

If this check box is selected, Kaspersky Endpoint Security uses Kaspersky Security Center as a proxy server for the application activation.

This check box is cleared by default.

This setting applies only if the application is used in standalone mode. If the application is used in Light Agent mode to protect virtual environments, the license information is provided by the Protection Server.

Page top

[Topic 246373]

Application settings

You can configure the general settings of Kaspersky Endpoint Security.

General application settings

Setting

Description

Detect legitimate applications that may be used by a hacker to harm devices or data

This check box enables or disables the detection of legitimate software that could be used by hackers to harm computers or data of users.

This check box is cleared by default.

Event notifications

This group of settings contains the Configure button. Clicking this button opens the Notification settings window. In this window, you can select the events that the application logs in the operating system log (syslog). To do this, select the check box next to each type of event that you want to log.

You can also select the check box next to the importance level of events (Critical events, Informational messages, Functional failures, and Warnings). In this case, the check boxes will be automatically selected next to each type of event that belongs to the group of the selected importance level.

All check boxes are cleared by default.

Limit CPU utilization for scan tasks (%)

The checkbox enables or disables the CPU utilization limit for the Malware Scan, Critical Areas Scan, Inventory, and Container Scan tasks.

If the checkbox is selected, the maximum utilization on all processor cores will not exceed the specified value (as a percentage) when running these tasks.

This check box is cleared by default.

Advanced application settings

The group of settings contains the Configure button. Clicking this button opens the Advanced application settings window. In this window, you can configure the settings for writing dump files.

Block access to files during scans

The checkbox enables or disables blocking access to files during scanning by the File Threat Protection, Anti-Cryptor, Device Control components and the Removable Drives Scan task.

If the check box is cleared, the

mode is enabled for the File Threat Protection and Device Control components.

The check box is selected by default.

Page top

[Topic 93764]

Advanced application settings window

In this window, you can configure the settings for writing dump files.

Dump file settings

Setting

Description

Create a dump file if the application crashes

This check box enables or disables the creation of a dump file when the application crashes.

This check box is cleared by default.

You must restart the application to apply the dump file settings.

Path to the dump file directory

Input field for the path to the directory where the dump files are stored. The input field is limited to 128 characters.

Default value: /var/opt/kaspersky/kesl/common/dumps.

Page top

[Topic 207663]

Container scan settings

You can configure the settings for namespace and container scan by Kaspersky Endpoint Security.

The application does not scan namespaces and containers unless components for working with containers and namespaces are installed in the operating system. Moreover, in the device properties in the Applications section, in the application properties in the Components section for container scans, the Stopped status is displayed.

Container scan settings

Setting

Description

Enable namespace and container scan

This check box enables or disables namespace and container scan.

The check box is selected by default.

Action with container upon threat detection

In the drop-down list, you can select the action to be performed on a container when an infected object is detected:

  • Skip container: if an infected object is detected, the application does not perform any action on the container.
  • Stop container: if an infected object is detected, the application stops the container.
  • Stop container if disinfection fails (default value) – the application stops the container if disinfection of the infected object fails.

This setting is available when using the application under a license that supports this function.

Container scan settings

The group of settings contains the Configure button. Clicking this button opens the Container scan settings window.

Page top

[Topic 209557]

Container Scan settings window

In this window, you can edit the settings for integrating Kaspersky Endpoint Security with the Docker container management system, the CRI-O environment, and the Podman and runc utilities.

Container scan settings

Setting

Description

Use Docker

This check box enables or disables the use of the Docker environment.

The check box is selected by default.

Docker socket path

Entry field for the path or URI (Uniform Resource Identifier) of the Docker socket.

Default value: /var/run/docker.sock.

Use CRI-O

The check box enables or disables the use of the CRI-O environment.

The check box is selected by default.

File path

Entry field for the path to CRI-O configuration file.

Default value: /etc/crio/crio.conf.

Use Podman

The check box enables or disables the use of the Podman utility.

The check box is selected by default.

File path

Entry field for the path to the Podman utility executable file.

Default value: /usr/bin/podman.

Root directory

Entry field for the path to the root directory of the container storage.

Use runc

The check box enables or disables the use of the runc utility.

The check box is selected by default.

File path

Entry field for the path to the runc utility executable file.

Default value: /usr/bin/runc.

Root directory

Entry field for the path to the root directory of the container state storage.

Default value: /run/runc.

Page top

[Topic 213466]

Managed Detection and Response

Integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response enables continuous search, detection and elimination of threats aimed at your organization.

When interacting with Kaspersky Managed Detection and Response, Kaspersky Endpoint Security allows you to perform the following actions:

  • Send telemetry data to Kaspersky Managed Detection and Response for threat detection.
  • Carry out Kaspersky Managed Detection and Response commands for providing security features.

    Managed Detection and Response settings

    Setting

    Description

    Enable Managed Detection and Response

    The check box enables integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response.

    This check box is cleared by default.

    Download

    Clicking this button opens a standard Microsoft Windows window, where you can select the BLOB configuration file.

Page top

[Topic 237101]

Network settings

You can configure the settings of encrypted connection scans. These settings are used by the Web Threat Protection component.

When the encrypted connection scan settings are changed, the application generates a Network settings changed event.

Network settings

Setting

Description

Enable encrypted connection scans

This check box enables or disables encrypted connection scans.

The check box is selected by default.

Action when an untrusted certificate is encountered

In the drop-down list, you can select an action to be performed by the application upon detection of an untrusted certificate:

  • Allow connections to a domain with an untrusted certificate (default value).
  • Block connection to a domain with an untrusted certificate.

Action on an encrypted connection scan error

In this drop-down list, you can select an action to be performed by the application when an error occurs during an encrypted connection scan:

  • Add to exclusions (default value) – add the domain that resulted in the error to the list of domains with scan errors and do not scan encrypted network traffic when this domain is visited.
  • Disconnect – block the network connection.

Certificate verification policy

In the drop-down list, you can select how the application verifies certificates:

  • Local check: the application does not use the internet to validate a certificate.
  • Full check (default value): the application uses the Internet to check and download the missing chains that are required to validate a certificate.

Trusted domains

This group of settings contains the Configure button. Clicking this button opens the Trusted domains window. In this window, you can configure the list of trusted domain names.

Trusted certificates

This group of settings contains the Configure button. Clicking this button opens the Trusted certificates window. In this window, you can configure a list of trusted certificates, which is used when scanning encrypted connections.

Network ports settings

This group of settings contains the Configure button. Clicking this button opens the Network ports window.

Page top

[Topic 239543]

Trusted domains window

This list contains the domain names and domain name masks that will be excluded from encrypted connection scans.

Example: *example.com. For example, *example.com/* is incorrect because a domain address, not a web page, needs to be specified.

By default, the list is empty.

You can add, edit and remove domains from the list of trusted domains.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 237264]

Trusted certificates window

You can configure a list of certificates considered trusted by Kaspersky Endpoint Security. The list of trusted certificates is used when scanning encrypted connections.

The following information is displayed for each certificate:

  • Subject – certificate subject
  • Serial number – serial number of the certificate
  • Issuer – issuer of the certificate
  • Valid from – certificate start date
  • Expires on – certificate expiration date
  • SHA-256 fingerprint – SHA-256 certificate thumbprint

By default, the certificate list is empty.

You can add and remove certificates.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 237263]

Adding certificate window

In this window, you can add a certificate to the trusted certificate list in one of the following ways:

  • Indicate the path to the certificate file. The Browse button opens the standard file selection window. Indicate the path to the file that contains the certificate, in DER or PEM format.
  • Copy the contents of the certificate file to the Enter certificate details field.
Page top

[Topic 210780]

Network ports window

Network ports settings

Setting

Description

Monitor all network ports

If this option is selected, the application monitors all network ports.

Monitor specified ports only

If this option is selected, the application monitors only the network ports specified in the table.

This option is selected by default.

Network ports settings

This table contains network ports monitored by the application if the Monitor specified ports only option is selected. The table contains two columns:

  • Port – monitored port.
  • Description – description of the monitored port.

By default, the table displays a list of network ports that are usually used for the transmission of mail and network traffic. The list of network ports is included in the application package.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210783]

Global exclusions

Global exclusions allow you to set the mount points that will be excluded from the scan scope for the application components that use the file operation interceptor (File Threat Protection and Anti-Cryptor).

Global exclusion settings

Setting

Description

Excluded mount points

This group of settings contains the Configure button. Clicking this button opens the Excluded mount points window.

Page top

[Topic 210784]

Excluded mount points window

The list contains paths to excluded mount points. By default, the list is empty.

You can add, edit, and delete items in the list.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 248968]

Mount point path window

Mount point settings

Setting

Description

File system, access protocol, and path

The settings block lets you set the location of the mount point.

In the drop-down list of file systems, you can select the type of file system where the directories that you want to add to scan exclusions are located:

  • Local: local mount points.
  • Mounted: remote directories mounted on the device using the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

If Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom: all the resources of the device file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a mount point that you want to exclude from file operation interception. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

Filesystem name

The field for entering the name of the file system where the directories that you to exclude from file operation interception are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Page top

[Topic 197981]

Excluding process memory

You can exclude process memory from scans. The application does not scan the memory of the specified processes.

You can create a list of exclusions in the Excluding process memory from scan block of the window that opens when you click the Configure button.

Page top

[Topic 236898]

Excluding process memory from scan window

The list contains paths to processes whose memory Kaspersky Endpoint Security excludes from process memory scans. You can use masks to specify the path. By default, the list is empty.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

You can add, edit, and delete items in the list.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected process path from the list.

This button is available if at least one process path is selected in the list.

The Edit button a window where you can change the process path. Kaspersky Endpoint Security excludes the memory of the indicated process from scans.

The Add button opens a window where you can enter the full path to a process. Kaspersky Endpoint Security excludes the memory of the indicated process from scans.

Page top

[Topic 210789]

Storage settings

The Storage is a list of backup copies of files that have been deleted or modified during the disinfection process. A backup copy is a copy of a file created before the first attempt to disinfect or delete this file. Backup copies of files are stored in a special format and do not pose a threat. By default, the Storage is located in the /var/opt/kaspersky/kesl/common/objects-backup/ directory. Files in the Storage may contain personal data. Root privileges are required to access files in the Storage.

Storage settings

Setting

Description

Inform about unprocessed files

This check box enables or disables sending notifications about the files, which cannot be processed during the scan, to the Administration Server.

The check box is selected by default.

Inform about installed devices

This check box enables or disables the sending of information about the devices installed on the managed client device to the Administration Server.

The check box is selected by default.

Notify about files in the Storage

This check box enables or disables sending of notifications about the files in the Storage to the Administration Server.

The check box is selected by default.

Store objects no longer than (days)

This check box enables or disables the storage period limit (in days) for the objects in the Storage.

Available values: 0–3653.

Default value: 90. If 0 is specified, the period for storing objects in the Storage is unlimited.

Maximum size of Storage (MB)

This check box enables or disables the maximum Storage size (in megabytes).

Available values: 0–999999. Default value: 0 (the size of Storage is unlimited).

Page top

[Topic 246859]

Kaspersky Endpoint Detection and Response (KATA) Integration

Kaspersky Endpoint Detection and Response (KATA) is a component of the Kaspersky Anti Targeted Attack Platform solution, which is designed to protect the IT infrastructure of organizations and promptly detect threats, such as zero-day attacks, targeted attacks, and advanced persistent threats (APT). To read more, check out the Kaspersky Anti Targeted Attack Platform Help.

When interacting with Kaspersky Endpoint Detection and Response (KATA), Kaspersky Endpoint Security may send data about events on devices (telemetry) to the Kaspersky Anti Targeted Attack Platform server with the Central Node component ("KATA server") and execute commands from Kaspersky Anti Targeted Attack Platform intended to provide security.

This feature is not supported in the KESL container.

For integration with Kaspersky Endpoint Detection and Response (KATA), the Behavior Detection component must be enabled.

The integration of Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA) is only possible if these components are enabled. Otherwise, the required telemetry data cannot be transmitted.

Kaspersky Endpoint Detection and Response (KATA) can additionally use data received from the following components:

  • File Threat Protection.
  • Network Threat Protection.
  • Web Threat Protection.

When integrated with Kaspersky Endpoint Detection and Response (KATA), devices with Kaspersky Endpoint Security establish secure connections to the KATA server via the HTTPS protocol. To ensure a secure connection, the following certificates issued by the KATA server are used:

  • KATA server certificate. The connection is encrypted using the server's TLS certificate. You can elevate the security of the connection by verifying the server certificate on the Kaspersky Endpoint Security side. You need to add the server certificate when configuring integration settings.
  • Client certificate. This certificate is used for additional protection of the connection using two-way authentication (scanning devices with Kaspersky Endpoint Security KATA server). The same client certificate can be used by multiple devices. By default, the KATA server does not validate client certificates, but validation can be enabled on the KATA server side. In this case, you need to enable two-way authentication in the integration options and add the client certificate (cryptocontainer with certificate and private key).

Certificates for securing the connection to the KATA server are provided by the Kaspersky Anti Targeted Attack Platform administrator.

A proxy server is used to connect to the KATA server if use of a proxy server is configured in the general application settings of Kaspersky Endpoint Security.

Kaspersky Endpoint Detection and Response (KATA) integration settings

Setting

Description

Integration with Endpoint Detection and Response (KATA).

Enables or disables the integration of the Kaspersky Endpoint Security application with Kaspersky Endpoint Detection and Response (KATA).

The integration is disabled by default.

KATA servers

The Configure button in the block opens the KATA servers window. In this window, you can configure a connection to KATA servers and view the list of servers to which a connection is configured.

Server connection settings

The Configure button in the block opens a window where you can configure general settings for connecting to KATA servers, add a server certificate, and configure two-way authentication upon connecting to KATA servers.

Data transfer settings

The Configure button in the block opens a window where you can configure settings for data to KATA servers.

Page top

[Topic 250326]

KATA servers window

The table in the window displays the list of settings for connecting to KATA servers. For each server for which a connection is configured, the table indicates an IP address (IPv4 or IPv6) or the server's fully qualified domain name (FQDN) and port.

You can use the buttons and the menu above the table to perform the following actions:

  • Add KATA server connection settings
  • Edit or remove previously configured connection settings
  • Export or import the list of configured connection settings
Page top

[Topic 250346]

KATA server window

In this window you can specify the connection settings to the KATA server.

KATA server connection settings

Setting

Description

Address

KATA server address IP address (IPv4 or IPv6) or fully qualified domain name (FQDN) of the integration server can be specified.

To ensure that communication with the KATA server is not interrupted if the application fails when network isolation is enabled for the device, it is recommended to specify the server's IP address.

Default value: 127.0.0.1.

Port

Port to connect to the KATA server.

The default value is 443.

Page top

[Topic 246861]

Server connection settings window

In this window, you can configure general settings for connecting to KATA servers.

KATA server connection settings

Setting

Description

Send a synchronization request to the KATA server every (minutes)

Frequency of sending synchronization requests to the KATA server in minutes.

Default value: 5.

Maximum time to wait for the server connection (sec)

Maximum time to wait for a connection to the KATA server in seconds.

The default value is 10.

Maximum time to wait for a response from the server (sec)

Maximum time to wait for a response from the KATA server in seconds.

The default value is 10.

Allow sending telemetry

Enables or disables sending data about events on devices (telemetry) to the KATA server.

Sending telemetry is enabled by default.

Use two-way authentication

Enables or disables the use of two-way authentication to further secure the connection to the KATA server.

To use two-way authentication, you need to add a client certificate.

Two-way authentication must be enabled on the KATA server side.

Add (client certificate)

Opens the window for adding a client certificate for additional security of the connection with the KATA server.

The button is displayed if the client certificate has not been added yet.

If you want to configure additional protection for the connection, enable verification of the client certificates on the KATA server side and select the Use two-way authentication checkbox in this window.

Remove (client certificate)

Removes the client certificate.

The button is displayed if a client certificate has been added.

Add (server certificate)

Opens adding a server certificate window.

The button is displayed if the server certificate has not been added yet.

Remove (server certificate)

Removes the server certificate.

The button is displayed only if a server certificate has been added.

Page top

[Topic 250852]

Adding a server certificate window

In this window, you can add a KATA server certificate in one of the following ways:

  • Specify the path to the certificate file in the Add from file field. The Browse button opens the standard file selection window. Specify the path to the file that contains the certificate in DER or PEM format.
  • Copy the contents of the certificate file to the Enter certificate details field.

If a server certificate has been added, the server certificate is verified on the Kaspersky Endpoint Security side. This elevates the security of the connection.

Page top

[Topic 246862]

Adding a client certificate window

In this window, you can add a client certificate to further secure the connection with the KATA server.

If you want to configure additional protection for the connection, enable verification of the client certificates on the KATA server side and select the Use two-way authentication checkbox in the Server connection settings window.

To add a client certificate, specify the path to the cryptocontainer (PFX archive) containing the client certificate and private key. The Browse button opens the standard file selection window. If the archive is password-protected, enter the password in the Cryptocontainer password field.

Page top

[Topic 250348]

Data transfer settings window

In this window, you can configure settings for sending data to KATA servers.

Settings for sending data to KATA servers

Setting

Description

Maximum delay when sending events (sec)

The maximum delay in sending events to the KATA server in seconds.

The default value is 30.

Enable event throttling

Enables or disables the regulation of the number of events sent to the KATA server.

Maximum number of events per hour

Maximum number of events per hour

The default value is 3000.

Event throttle threshold (percentage)

Event throttle threshold (percentage). Sending events is limited if ratio of events of one type (for example, events about registry changes) to the total number of events exceeds the set threshold (as a percentage).

The default value is 15.

Page top

[Topic 246881]

Light Agent mode

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments.

Running Kaspersky Endpoint Security in Light Agent mode requires constant interaction between the Light Agent and the Protection Server installed on the SVM. If there is no connection to the Protection Server, the Light Agent cannot transfer file fragments to the Protection Server for scanning, and scanning is not performed.

To interact with the Protection Server, the Light Agent establishes and maintains a connection to the SVM on which this Protection Server is installed.

You can configure the following settings for connecting the Light Agent to the SVM:

  • SVM detection method. You can select the method that Light Agents use to discover SVMs available to connect to. The Light Agent can discover SVMs running on the network in one of the following ways:
    • Using the Integration Server. SVMs transmit information about themselves to the Integration Server. The Integration Server generates a list of SVMs available for connection and provides it to Light Agents.

      To use this method of detecting SVMs, you need to connect SVMs and Light Agents to the Integration Server.

    • Using a list of SVM addresses. You can specify a list of SVM addresses to which Light Agents can connect.
  • SVM selection algorithm for connecting. After receiving information about available SVMs, the Light Agent selects the optimal SVM to connect to in accordance with the SVM selection algorithm. You can specify which algorithm Light Agents should use when selecting an SVM to connect to.
  • Connection tags. You can use connection tags to control Light Agents' connection to SVMs. If you use connection tags, Light Agent can only connect to SVMs that are configured to use that connection tag.
  • Protection of the connection between the Light Agent and the Protection Server. You can use encryption to protect the connection between Light Agents and Protection Servers.

For more information about the settings for connecting the Light Agent to the SVM, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

Page top

[Topic 93534]

Connection to the Integration Server

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments.

A connection to the Integration Server is required if you want Light Agents to receive information about the SVM through the Integration Server, or if you want to protect the connection between the Protection Server and the Light Agent.

This window displays the current settings for connecting Light Agents to the Integration Server: address and port for connecting. The Edit button opens the Connection to the Integration Server window, where you can configure the connection to the Integration Server.

Page top

[Topic 261372]

Connection to the Integration Server window

In this window, you can specify or change the settings for connecting Light Agents to the Integration Server.

Integration Server connection settings

Setting

Description

Address

IP address in IPv4 format or fully qualified domain name (FQDN) of the device on which the Integration Server is installed.

If the device on which Kaspersky Security Center Administration Console is installed is part of a domain, the field indicates the domain name of this device by default.

If the device on which the Kaspersky Security Center Administration Console is installed is not part of a domain or the Integration Server is installed on another device, the field must be filled in manually.

If a NetBIOS name, "localhost", or 127.0.0.1 is specified as the address, the connection to the Integration Server fails with an error.

Port

Port for connecting to the Integration Server.

Port 7271 is used by default.

Page top

[Topic 197614]

Verify Integration Server certificate window

This window appears if the SSL certificate received from the Integration Server contains an error or is not trusted.

You can click the link in the window to view the details of the received certificate.

If you encounter problems with an SSL certificate, we recommend to make sure that the data transmission channel you are using is secure.

To continue connecting to the Integration Server, click the Ignore button. The received certificate will be installed as a trusted certificate on the device where the Kaspersky Security Center Administration Console is installed.

Page top

[Topic 197254]

Authentication on the Integration Server window

This window appears if the device hosting the Kaspersky Security Center Administration Console does not belong to a domain or your account does not belong to the KLAdmins local or domain group or to the local administrator group.

Specify the password of the Integration Server administrator (password of the admin account) and click the OK button.

It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

After connecting to the Integration Server with administrator rights, the policy automatically receives the password of the agent account, which is used to connect Light Agents to the Integration Server.

Page top

[Topic 261233]

SVM discovery settings

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments.

In this window, you can select the method that Light Agents use to discover SVMs available to connect to.

SVM discovery settings

Setting

Description

Use the Integration Server

If this option is selected, Light Agent connects to Integration Server to get a list of SVMs available for connection and their details.

If you want to use the Integration Server, you need to configure the settings for connecting Light Agents to the Integration Server.

Use a custom list of SVM addresses

If this option is selected, you can specify a list of SVMs that Light Agents managed by this policy can connect to. Light agents will only connect to SVMs specified in the list.

List of SVMs

A list of IP addresses in IPv4 format or fully qualified domain names (FQDNs) of the SVMs to which Light Agents managed by the policy can connect.

Click Add to open a window in which you can specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the SVM. You can enter multiple IP addresses or FQDNs of SVMs on a new line.

Specify only fully qualified domain names (FQDNs) that map to a single IP address. Using a fully qualified domain name that corresponds to multiple IP addresses can lead to errors in the application.

You can delete addresses selected in the list by clicking the Delete button.

The list of SVM addresses is displayed if the Use a custom list of SVM addresses option is selected.

If you select the Use a custom list of SVM addresses option, the Light Agent is using the extended SVM selection algorithm, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. In the SVM selection algorithm section, you need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

Page top

[Topic 261235]

SVM connection tag

In this window, you can enable the Light Agent to use tags and assign a tag that the Light Agent will use to connect.

Make sure that the use of connection tags is also configured in the Protection Server settings: For more information, see the Help for Kaspersky Security for Virtualization Light Agent. Light Agents assigned a tag can only connect to SVMs that are allowed to connect to Light Agents with that tag.

Settings for using connection tags

Setting

Description

Use tags for connecting Light Agents

The check box enables or disables the use of SVM connection tags by the Light Agent.

Tag

A tag that is assigned to Light Agents.

You can enter a text string of up to 255 characters as a tag. You can use any character except the ; character.

This field is available if the Use tags for connecting Light Agents check box is selected.

Page top

[Topic 261236]

SVM selection algorithm

  • In this window, you can specify which SVM selection algorithm Light Agents for Linux should use, and configure the settings for using the extended SVM selection algorithm.

    SVM selection algorithm

    Setting

    Description

    Use the standard SVM selection algorithm

    If this option is selected, after installing and running on a virtual machine, the Light Agent selects an SVM to connect to that is local to Light Agent. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

    If there are no local SVMs available for connection, the Light Agent selects the SVM that has the fewest Light Agents connected, regardless of the location of the SVM in the virtual infrastructure.

    This option is selected by default.

    Use the extended SVM selection algorithm

    If this option is selected, you can use the SVM path slider to specify how the SVM's location in the virtual infrastructure will be taken into account when determining whether the SVM is local relative to the Light Agent. The Light Agent will only be able to connect to SVMs that are local.

    You can also specify that the SVM path in the virtual infrastructure should not be taken into account when selecting an SVM to connect to.

    When selecting an SVM, Light Agents consider the number of Light Agents connected to the SVM to ensure an even distribution of Light Agents among the SVMs available to connect to.

    SVM path

    Allows you to specify the type of SVM path in the virtual infrastructure, which is taken into account when selecting SVMs for connection:

    • Hypervisor. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
      • The SVM is deployed on the same hypervisor as the virtual machine with the installed Light Agent (in a virtual infrastructure running on the Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server, or Astra Linux platform).
      • SVM is located in the same server group, as the virtual machine with the installed Light Agent (in virtual infrastructure running on TIONIX Cloud Platform or OpenStack platform).

      If there are no SVMs available for connection on the same hypervisor or in the same Server Group where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

    • Cluster. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
      • The SVM is deployed in the same hypervisor cluster as the virtual machine with the Light Agent installed (in a virtual infrastructure on Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Scala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server, or Astra Linux);
      • The SVM is deployed in the same OpenStack project as the virtual machine with the Light Agent installed (in a virtual infrastructure managed by the TIONIX Cloud Platform or the OpenStack platform).

      If there are no SVMs available for connection in the same hypervisor cluster or within the same OpenStack project where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

    • Data center. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
      • The SVM is deployed in the same data center as the virtual machine with the Light Agent installed (in a virtual infrastructure on Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Scala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server or Astra Linux).
      • The SVM is located in the same Availability Zone as the virtual machine with the Light Agent installed (in a virtual infrastructure managed by the TIONIX Cloud Platform or the OpenStack platform).

      If there are no SVMs available for connection in the same data center or Availability Zone where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

    • Ignore SVM path. When selecting an SVM, the Light Agent does not consider its location.

    The Hypervisor option is selected by default.

    The option is available if the Use the extended SVM selection algorithm option is selected.

If a Light Agent uses the extended SVM selection algorithm and a list of SVM addresses is selected as the SVM discovery method, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. You need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

Page top

[Topic 261237]

Protecting the connection

In this window, you can enable encryption of the data transmission channel between the Light Agent and the Protection Server

Make sure that encryption of the data transmission channel between the Light Agent and the Protection Server is enabled in the Protection Server settings on the SVM. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

Connection protection settings

Setting

Description

Encrypt data channel between Light Agent and the Protection Server

Use encryption to protect the connection between Light Agents and Protection Servers.

If the check box is selected, a secure connection is established between the Light Agent, which is managed by policy, and the Protection Server on the SVM that the Light Agent is connecting to. A Light Agent for which connection protection is enabled can only connect to an SVM on which connection protection is enabled or an unprotected connection to the Protection Server is allowed.

If the check box is cleared, an unprotected connection is established between the Light Agent and the Protection Server on the SVM that the Light Agent is connecting to.

This check box is cleared by default.

Page top

[Topic 198050]

Managing tasks in the Administration Console

The tasks are executed only if Kaspersky Endpoint Security is running on the devices.

You can create the following tasks for working with Kaspersky Endpoint Security using Kaspersky Security Center Administration Console:

  • Local tasks that are configured for an individual device
  • Group tasks that are configured for devices within administration groups
  • Tasks for sets of devices that do not belong to administration groups

    The tasks for the sets of devices are performed only on the devices that are specified in the task settings. If new devices are added to the device selection for which the task is created, this task is not applied to the new devices. To apply the task to these computers, you must create a new task or edit the settings of the existing task.

You can create any number of group tasks, tasks for a set of devices, or local tasks.

The Add Key, Update, and Rollback tasks are not applicable if the application is used in Light Agent mode to protect virtual environments.

You can perform the following actions with tasks:

  • Start, stop, pause, and resume tasks.

    The Update task cannot be paused or resumed. It can only be started or stopped.

  • Create new tasks.
  • Edit task settings.

    If the user account which is used to access the Administration Server does not have permissions to edit the settings of certain functional scopes, the settings of these functional scopes are not available for editing. Configuration of some settings is not supported in the KESL container.

  • Compare task versions in the Revision history section of the task properties window.

General information about the tasks in the Administration Console is provided in Kaspersky Security Center documentation.

In this section

Creating a local task

Creating a group task

Creating a task for device sets

Manually starting, stopping, pausing, and resuming a task

Editing local task settings

Editing group task settings

Editing device sets task settings

Page top

[Topic 198052]

Creating a local task

To create a local task:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the device for which you want to create a local task. In the device context menu, select Properties.
  5. In the Properties: <Device name> window, select the Task section.
  6. Click Add.

    The Task Wizard starts.

  7. Follow the Task wizard instructions.

Page top

[Topic 198053]

Creating a group task

To create a group task:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Administration Console tree, select the Tasks folder.
  3. In the workspace, click the New task button.

    The Task Wizard starts.

  4. Follow the Task wizard instructions.

Page top

[Topic 198054]

Creating a task for device sets

To create a task for a set of devices:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Administration Console tree, select the Tasks folder.
  3. In the workspace, click the New task button.

    The Task Wizard starts.

  4. Follow the Task wizard instructions.
  5. In the Select devices to which the task will be assigned window of the Wizard, click the Assign task to a device selection button.
  6. In the next window of the Wizard, click the Browse button.

    The Device selection window will open.

  7. Select the required devices and click OK in the Device selection window.
  8. Click Next.
  9. Follow the Task wizard instructions.
Page top

[Topic 198055]

Manually starting, stopping, pausing, and resuming a task

If Kaspersky Endpoint Security is running on the client device, you can start, stop, pause, and resume the task on this client device using Kaspersky Security Center. When Kaspersky Endpoint Security is paused, running tasks are paused as well, and it becomes impossible to start, stop, pause, or resume a task using Kaspersky Security Center.

To start, stop, pause, or resume a local task:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the device on which you want to start, stop, pause, or resume a local task.
  5. In the device context menu, select Properties.
  6. In the Properties: <Device name> window, select the Task section.

    A list of local tasks appears in the right part of the window.

  7. Select a local task that you want to start, stop, pause, or resume.
  8. Do one of the following:
    • In the context menu of the local task, select Start / Stop / Pause / Resume.
    • To start or stop a local task, click the / button to the right of the local tasks list.
    • Click the Properties button under the list of local tasks and in the Properties: <Local task name> window that opens, on the General tab, click the Start / Stop / Pause / Resume button.

To start, stop, pause, or resume a group task:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, select the folder with the name of the administration group for which you want to start, stop, pause, or resume a group task.
  3. In the workspace, select the Tasks tab.

    A list of group tasks appears in the right part of the window.

  4. Select a group task that you want to start, stop, pause, or resume.
  5. In the context menu of the group task, select Start / Stop / Pause / Resume.

Page top

[Topic 198056]

Editing local task settings

To edit the local task settings:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the device for which you want to configure the application settings. In the device context menu, select Properties.
  5. In the Properties: <Device name> window, select the Task section.

    A list of local tasks appears in the right part of the window.

  6. Select the required local task and in the context menu of the task, select Properties.

    The Properties: <Local task name> window will open.

  7. Edit the local task settings.
  8. In the Properties: <Local task name> window, click OK to save the changes.

The number and the contents of the sections depend on the type of the selected task. The contents of the General, Notifications, Schedule, and Revision history sections are identical for all tasks. For a detailed description of these sections, please refer to the Kaspersky Security Center documentation.

Page top

[Topic 198057]

Editing group task settings

to edit the group task settings:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the required administration group.
  3. In the workspace, select the Tasks tab.
  4. In the list of group tasks, select the required group task and select Properties in the task context menu.

    The Properties: <Group task name> window will open.

  5. Edit the group task settings.
  6. In the Properties: <Group task name> window, click OK to save the changes.

The number and the contents of the sections depend on the type of the selected task. The contents of the General, Notifications, Schedule, and Revision history sections are identical for all tasks. For a detailed description of these sections, please refer to the Kaspersky Security Center documentation.

Page top

[Topic 198058]

Editing device sets task settings

To edit the task settings for a set of devices:

  1. Open the Administration Console of Kaspersky Security Center.
  2. Select the Tasks folder.
  3. In the Tasks folder, in the list of tasks, select the task for the set of devices. To change the settings of this task, select Properties from the task context menu.

    The Properties: <Task name> window will open.

  4. Edit the task settings for the set of devices.
  5. In the Properties: <Task name> window click OK.

The number and the contents of the sections depend on the type of the selected task. The contents of the General, Notifications, Schedule, and Revision history sections are identical for all tasks. For a detailed description of these sections, please refer to the Kaspersky Security Center documentation.

Page top

[Topic 246375]

Task settings

The following types of tasks are provided for managing Kaspersky Endpoint Security by means of Kaspersky Security Center:

  • Malware Scan. During the task execution, the application scans the device areas that are specified in the task settings for viruses and other malware.
  • Add Key. During the task execution, the application adds a key, including a reserve one, to activate the application.
  • Inventory Scan. During the task execution, the application receives information about all executable files stored on the devices.
  • Update. During the task execution, the application updates the databases in accordance with the configured update settings.
  • Rollback. During the task execution, the application rolls back the last database update.
  • Critical Areas Scan. During the task execution, the application scans boot sectors, startup objects, process memory, and kernel memory.
  • Container Scan. During the task execution, the application scans containers and images for viruses and other malware.
  • System Integrity Check. During the task execution, the application determines changes of each object by comparing the current state of the monitored object to its original state, which was previously established as a baseline.

The set of policy settings and default values for task settings depend on the license type. The Add Key, Update and Rollback tasks are not applicable if the application is used in Light Agent mode to protect virtual environments. Additionally, some application functions are not supported in a KESL container.

In this section

Add Key

Inventory

Update

Rollback

Malware Scan

Critical Areas Scan

Container Scan

System Integrity Check

Page top

[Topic 247234]

Add a key

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, activation of the application using the Add key task is not supported.

If the Kaspersky Endpoint Security application is used in standalone mode, you can use the Add key task to add a license key for activating the application.

Add a key task settings

Setting

Description

Use as a reserve key

This check box enables or disables the usage of the key as a reserve key.

If this check box is selected, the application uses the key as a reserve key.

If this check box is cleared, the application uses the key as an active key.

This check box is cleared by default.

The check box is unavailable if you are adding a trial license key or a subscription key.

A trial license key and a subscription key cannot be added as a reserve key.

Select key

Clicking this button opens the Kaspersky Security Center key storage window. In this window, you can select keys added to Kaspersky Security Center key storage and add keys to Kaspersky Security Center key storage.

License information

This section contains information about the key and the license corresponding to this key:

  • License key – unique alphanumeric sequence. You may use the application only if it has a key.
  • License type can be trial, commercial, or commercial (subscription).
  • License validity period is the number of days during which you can use the application activated by this key (for example, 365 days). This information is not displayed if you use the application under a subscription.
  • Grace period – the number of days after the subscription ends during which the application retains its functionality. The field is displayed if you are using the application under a subscription and the service provider with which you registered your subscription offers a grace period for renewing your subscription.
  • Expires on is the date and time when the application activated by this key expires, in UTC. If you use the application under an unlimited subscription, the license expiration date is not specified.
  • Limit is the maximum number of devices that the application can protect.
  • Description – description of the license.

Page top

[Topic 247221]

Kaspersky Security Center key storage window

In this window, you can select keys added to Kaspersky Security Center key storage and add keys to Kaspersky Security Center key storage.

Settings in the Kaspersky Security Center key storage window

Setting

Description

Key table

The table contains the keys added to Kaspersky Security Center key storage and consists of the following columns:

  • License type can be one of the following: trial, commercial, or commercial (subscription).
  • Expires on is the expiration date of the application activated by this key.
  • License validity period is the number of days during which you can use the application activated by this key (for example, 365 days). This information is not displayed if you use the application under a subscription.
  • Limit is the maximum number of devices that the application can protect.
  • Description – description of the license.
  • License key – unique alphanumeric sequence.

Add a key

Clicking this button launches the Add license key wizard. The key will be added to Kaspersky Security Center key storage. After adding a key, information about it will be displayed in the key table.

Page top

[Topic 202213]

Inventory

The Inventory task provides information about all applications executable files stored on the client devices. Obtaining information about the applications installed on the devices can be useful, for example, for creating Application Control rules.

This feature is not supported in the KESL container.

To use the task, a license that includes the corresponding function is required.

The Kaspersky Security Center database can store information about up to 150,000 processed files. When this number of records is reached, new files will not be processed. To resume the Inventory task, delete the files registered in the Kaspersky Security Center database as a result of previous inventories, from the device where Kaspersky Endpoint Security is installed.

Inventory task settings

Setting

Description

Add files to the Golden Image category

The check box enables or disables adding applications detected on the device by the Inventory task to the Golden Image category. If the check box is selected, you can use the "Golden Image" category in the Application Control rules.

This check box is cleared by default.

Scan all executables

This check box enables or disables of executable file scans.

The check box is selected by default.

Scan binaries

This check box enables or disables of binary file scans (with extensions elf, java, and pyc).

The check box is selected by default.

Scan scripts

This check box enables or disables script scans.

The check box is selected by default.

Inventory scopes

The group of settings contains the Configure button. Clicking this button opens the Scan scopes window.

In the Exclusion scopes section for the Inventory task, you can also configure scopes to be excluded from scans.

Page top

[Topic 215256]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope – /usr/bin.

Scan scope settings for the Inventory task

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 213264]

<New scan scope> window

In this window, you can add and configure scan scope for the Inventory task.

Inventory scope settings

Setting

Description

Scan scope name

Field for entering the scan scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables the scan of this scope when the task is performed.

If this check box is selected, the application processes this scan scope while running the task.

If this check box is cleared, the application does not process this scan scope while running the task. You can later include this scope in task settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the scan scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

Masks

This list contains name masks of the objects that the application scans while running the task.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210496_2]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 213263]

<New exclusion scope> window

In this window, you can add and configure scan exclusion scope for the Inventory task.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables the exclusion of the scope when the task is executed.

If this check box is selected, the application excludes this scope during task execution.

If this check box is cleared, the application includes this scope during task execution. You can later exclude this scope from scanning by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to exclude from the inventory. You can use masks to specify the path. The field must not be blank.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

Masks

The list contains name masks of the objects that the application excludes from scan.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 246378]

Update

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the application databases and modules cannot be updated using the task created in Kaspersky Security Center. Updates are performed using a local predefined task.

Updating the databases and application modules of Kaspersky Endpoint Security ensures up-to-date protection on your device. New viruses and other types of malware appear worldwide on a daily basis. The application databases contain information about the threats and the ways to neutralize them. To detect threats quickly, you are urged to regularly update the application databases and modules.

An update source is a resource that contains updates for Kaspersky Endpoint Security databases and application modules. Update sources can be FTP, HTTP, or HTTPS servers (such as Kaspersky Security Center and Kaspersky update servers), as well as local or network directories mounted by the user.

Update source settings for the Update task

Setting

Description

Update source

In this section, you can select the update source:

  • Kaspersky update servers, where database updates for Kaspersky applications are published (default value).
  • Kaspersky Security Center – Kaspersky Security Center Administration Server.
  • Other sources on the local or global network – HTTP, HTTPS, or FTP servers or directories on local network servers.

Use Kaspersky update servers if other update sources are not available

The check box enables or disables usage Kaspersky update servers as the update source, if the selected update sources are not available.

This check box is available if under Update sources, the Other sources on the local or global network or Kaspersky Security Center option is selected.

The check box is selected by default.

Custom update sources

This table contains a list of custom sources of database updates. During the update process, the application accesses update sources in the order they appear in the table.

The table contains the following columns:

  • Source address – HTTP, HTTPS, or FTP servers or directories on local network servers.
  • Status indicates if the source is used in the task (In use or Not in use). You can change the status by selecting or clearing the Use this source check box in the Update source window that opens when you click the Edit button.

     

This table is available if the Other sources on the local or global network option is selected.

You can add, edit, delete, move up, or move down update sources in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

The table is empty by default.

In the Settings section, you can specify the response timeout and the application update download settings.

Additional settings of the Update task

Setting

Description

Maximum time to wait for a response from the update source (sec)

The maximum period of time that the application waits for a response from the selected update source (in seconds). When no response has arrived by this time, an event involving a loss of communication with the update source is logged in the task log.

Available values: 0–120. If 0 is specified, the period of time that the application waits for a response from the selected source is unlimited.

Default value: 10 seconds.

Application update download mode

In the drop-down list, you can select the mode for updating application databases:

  • Do not download updates. If this list item is selected, the application cannot be updated.
  • Download only update files, but do not install them on client devices (default value).
  • Download and install updates to client devices. After updates are installed, the application will restart automatically.

     

This feature is not supported in the KESL container.

Page top

[Topic 202208]

Rollback

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the task cannot be used to rollback database updates.

After the application databases are updated for the first time, the rollback of the application databases to their previous versions becomes available.

Every time a user starts the update process, Kaspersky Endpoint Security creates a backup copy of the current application databases. This allows you to roll back the application databases to a previous version if needed.

Rolling back the last database update may be useful, for example, if the new application database version contains invalid signatures, which causes Kaspersky Endpoint Security to block safe applications.

The rollback task does not have any settings.

Page top

[Topic 246376]

Malware Scan

Malware Scan is a one-time full or custom scan of files on the device performed by the application. The application can carry out multiple malware scanning tasks at the same time.

By default, the application creates one standard virus scan task — a full scan. The application scans all the objects located on the local drives of the device, as well as all mounted and shared objects that are accessed via the Samba and NFS protocols with the recommended security settings.

During a full disk scan, the processor is busy. It is recommended to run the full scan task when the business is idle.

Malware Scan task settings

Setting

Description

Scan

This group of settings contains buttons that open windows where you can configure the scan scopes, scan scope settings, and scan settings.

Action on threat detection

This group of settings contains the Configure button. Clicking this button opens the Action on threat detection window, where you can configure the actions that the application performs on detected infected objects.

In the Exclusions section, you can also configure exclusion scopes as well as exclusions by mask and by the threat name for Malware Scans.

Page top

[Topic 202257_2]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Scan scope settings

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 248962_1]

<New scan scope> window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scan scope name

Field for entering the scan scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the scan scope.

You can select the file system type in the drop-down list of file systems:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

If Shared or Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want to add to the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246377]

Scan scope settings window

In this window, you can configure the scan settings for the Malware Scan task. The application allows you to scan files, boot sectors, device memory, and startup objects.

Scan scope settings

Setting

Description

Scan files

This check box enables or disables file scans.

If the check box is selected, the application scans the files.

If the check box is cleared, the application does not scan the files.

The check box is selected by default.

Scan boot sectors

This check box enables or disables boot sector scans.

If the check box is selected, the application scans the boot sectors.

If the check box is cleared, the application does not scan the boot sectors.

This check box is cleared by default.

Scan kernel memory and running processes

This check box enables or disables device memory scan.

If the checkbox is selected, the application scans kernel memory and running processes.

If the check box is cleared, the application does not scan kernel memory and running processes.

This check box is cleared by default.

Scan startup objects

This check box enables or disables startup object scans.

If the check box is selected, the application scans startup objects.

If the check box is cleared, the application does not scan startup objects.

This check box is cleared by default.

Devices to scan

This group of settings contains the Configure button. Clicking this button opens the Scan scopes window, where you can specify the devices whose boot sectors must be scanned.

Page top

[Topic 215174]

Scan scopes window

The table contains name masks of the devices, whose boot sectors the application must scan. By default, the table contains the /** device name mask (all devices).

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210861]

Scan settings window

In this window, you can configure the file scan settings for the task.

Scan settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

Page top

[Topic 210864]

Action on threat detection window

In this window, you can configure actions to be performed by Kaspersky Endpoint Security on detected infected objects:

Actions on threat detection

Setting

Description

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

     

Page top

[Topic 215184]

Critical Areas Scan

The Critical Areas Scan task allows you to scan files, boot sectors, startup objects, process memory, and kernel memory.

Critical Areas Scan task settings

Setting

Description

Scan

This group of settings contains buttons that open windows where you can configure the scan scopes, scan scope settings, and scan settings.

Action on threat detection

This group of settings contains the Configure button. Clicking this button opens the Action on threat detection window, where you can configure the actions that the application performs on detected infected objects.

In the Exclusions section, you can also configure exclusion scopes as well as exclusions by mask and by the threat name for the Critical areas scan task.

Page top

[Topic 202257_3]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Scan scope settings

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 248962_2]

<New scan scope> window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scan scope name

Field for entering the scan scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

The settings block lets you set the scan scope.

You can select the file system type in the drop-down list of file systems:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

If Shared or Mounted is selected in the drop-down list of file systems, you can select the remote access protocol in the drop-down list on the right:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

If Local is selected in the drop-down list of file systems, then in the input field you can enter a path to a directory that you want to add to the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Filesystem name

The field for entering the name of the file system where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the drop-down list of file systems and the Custom item is selected in the drop-down list on the right.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 215199]

Scan scope settings window

In this window, you can configure the scan settings for the Critical Areas Scan task. The application allows you to scan files, boot sectors, startup objects, process memory, and kernel memory.

Scan scope settings

Setting

Description

Scan files

This check box enables or disables file scans.

If this check box is selected, Kaspersky Endpoint Security will scan files.

If this check box is unchecked, Kaspersky Endpoint Security will not scan files.

This check box is cleared by default.

Scan boot sectors

This check box enables or disables boot sector scans.

If this check box is selected, Kaspersky Endpoint Security will scan boot sectors.

If this check box is unchecked, Kaspersky Endpoint Security will not scan boot sectors.

The check box is selected by default.

Scan kernel memory and running processes

This check box enables or disables device memory scan.

If the check box is selected, Kaspersky Endpoint Security scans kernel memory and running processes.

If the check box is cleared, Kaspersky Endpoint Security does not scan kernel memory and running processes.

The check box is selected by default.

Scan startup objects

This check box enables or disables startup object scans.

If this check box is selected, Kaspersky Endpoint Security will scan startup objects.

If this check box is unchecked, Kaspersky Endpoint Security will not scan startup objects.

The check box is selected by default.

Devices to scan

This group of settings contains the Configure button. Clicking this button opens the Scan scopes window, where you can specify the devices whose boot sectors must be scanned.

Page top

[Topic 215174_1]

Scan scopes window

The table contains name masks of the devices, whose boot sectors the application must scan. By default, the table contains the /** device name mask (all devices).

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210861_1]

Scan settings window

In this window, you can configure the file scan settings for the task.

Scan settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

Page top

[Topic 210864_1]

Action on threat detection window

In this window, you can configure actions to be performed by Kaspersky Endpoint Security on detected infected objects:

Actions on threat detection

Setting

Description

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

     

Page top

[Topic 210891]

Container Scan

When the Container Scan task is running, Kaspersky Endpoint Security scans containers and images for viruses and other malware. You can run multiple Container Scan tasks simultaneously.

Integration with Docker container management system, CRI-O framework, and Podman and runc utilities is supported.

To use the task, a license that includes the corresponding function is required.

Container scan task settings

Setting

Description

Scan

This group of settings contains buttons that open windows where you can configure the Container Scan settings and general scan settings.

Action on threat detection

This group of settings contains the Configure button. Clicking this button opens the Action on threat detection window, where you can configure the actions that the application performs on detected infected objects.

In the Exclusions section, you can also configure exclusions by mask and by the threat name for the Container scan task.

Page top

[Topic 210893]

Container Scan settings window

In this window, you can configure container and image scan settings.

Container and image scan settings

Setting

Description

Scan containers

This check box enables or disables container scans. If the check box is selected, you can specify a name or a name mask for containers to be scanned.

The check box is selected by default.

Name mask

Entry field for a name or a name mask for containers to be scanned.

By default, the * mask is specified – all containers will be scanned.

Action on threat detection

In the drop-down list, you can select the action to be performed on a container when an infected object is detected:

  • Skip container – do not perform any actions on the container when an infected object is detected.
  • Stop container – stop container when an infected object is detected.
  • Stop container if disinfection fails (default value) – stop the container if disinfection of the infected object or elimination of the threat fails.

Due to the way a CRI-O environment works, an infected object is not disinfected or deleted in a container in a CRI-O environment. We recommend to select the Stop container action.

Scan images

This check box enables or disables the image scan. If the check box is selected, you can specify a name or a name mask for images to be scanned.

The check box is selected by default.

Name mask

Entry field for a name or a name mask for images to be scanned.

By default, the * mask is specified (all images are scanned).

Action on threat detection

In the drop-down list, you can select the action to be performed on an image when an infected object is detected:

  • Skip image (default value) – do not perform any actions on the image when an infected object is detected.
  • Delete image when an infected object is detected (not recommended). All dependencies will also be deleted. Running containers will be stopped, and then deleted.

Scan each layer

This check box enables or disables the scanning of all layers of images and running containers.

This check box is cleared by default.

Page top

[Topic 210861_2]

Scan settings window

In this window, you can configure the file scan settings for the task.

Scan settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

Page top

[Topic 210864_2]

Action on threat detection window

In this window, you can configure actions to be performed by Kaspersky Endpoint Security on detected infected objects:

Actions on threat detection

Setting

Description

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be moved to the Backup.
  • Remove the object. A copy of the infected object will be moved to the Backup.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

     

Page top

[Topic 215330]

Exclusions section

Settings of scan exclusions

Group of settings

Description

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window. In this window, you can configure the exclusion of objects from scans by name mask.

Exclusions by threat name

This group of settings contains the Configure button, which opens the Exclusions by threat name window. In this window, you can configure the exclusion of objects from scans based on threat name.

Page top

[Topic 239415]

System Integrity Check

While the System Integrity Check (ODFIM) task is running, each object change is determined by comparing the current state of the monitored objects with its original state, which was previously established as a baseline.

To use the task, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

The system baseline is created during the first run of the ODFIM task on the device. You can create several ODFIM tasks. For each ODFIM task, a separate baseline is created. The task is performed only if the baseline corresponds to the monitoring scope. If the baseline does not match the monitoring scope, Kaspersky Endpoint Security generates a system integrity violation event.

The baseline is rebuilt after an ODFIM task has finished. You can rebuild a baseline for a task using the corresponding setting. Also, a baseline is rebuilt when the settings of a task change, for example, if a new monitoring scope is added. The baseline will be rebuilt during the next task run. You can delete a baseline by deleting the corresponding ODFIM task.

System Integrity Check task settings

Setting

Description

Rebuild baseline on each task start

This check box enables or disables the rebuilding of the system baseline every time the System Integrity Check task is started.

This check box is cleared by default.

Use hash for monitoring (SHA-256)

This check box enables or disables the use of the file hash as a criterion when comparing the current state of the file with its original state.

If this check box is cleared, the application compares only the file size (if the file size has not changed, then the modification time is not considered a critical parameter).

This check box is cleared by default.

Track directories in monitoring scopes

This check box enables or disables checking of the specified directories while the System Integrity Check task is running.

This check box is cleared by default.

Track last file access time

This check box enables or disables the tracking of file access time while the System Integrity Check task is running.

This check box is cleared by default.

Monitoring scopes

The group of settings contains the Configure button. Clicking this button opens the Scan scopes window.

In the Exclusion scopes section, you can also configure monitoring exclusion scopes and exclusions by mask for the System Integrity Check task.

Page top

[Topic 246670]

Scan scopes window

The table contains monitoring scopes for the System Integrity Check task. The application monitors files and directories located in the paths specified in the table. By default, the table contains one monitoring scope, Kaspersky internal objects (/opt/kaspersky/kesl/).

Monitoring scope settings

Setting

Description

Scope name

Monitoring scope name.

Path

Path to the directory that the application protects.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes, in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 246671]

<New scan scope> window

In this window, you can add and configure monitoring scopes for the System Integrity Check task.

Monitoring scope settings

Setting

Description

Scan scope name

Field for entering the monitoring scope name. This name will be displayed in the table in the Scan scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application controls this monitoring scope during the application's operation.

If this check box is cleared, the application does not control this monitoring scope during the operation. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the monitoring scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

The default path is /opt/kaspersky/kesl.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 215327]

Exclusion scopes section

Settings of scan exclusions

Group of settings

Description

Monitoring exclusions

This group of settings contains the Configure button. Clicking this button opens the Exclusion scopes window. In this window, you can define the list of scopes to be excluded from monitoring.

Exclusions by mask

This group of settings contains the Configure button, which opens the Exclusions by mask window. In this window, you can configure the exclusion of objects from monitoring by name mask.

Page top

[Topic 246672]

Exclusion scopes window

The table contains scan exclusion scopes for the System Integrity Check component. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Scan exclusion scope settings for the System Integrity Check task

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

Indicates whether the application excludes this scope from monitoring during the component operation.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246673]

<New exclusion scope> window

In this window, you can add and configure the monitoring exclusion scope for the System Integrity Check task.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window. The entry field must not be blank.

Use this scope

The check box enables or disables the exclusion of the scope from monitoring when the application is running.

If this check box is selected, the application excludes this scope from monitoring during the task operation.

If this check box is cleared, the application monitors this scope during the task operation. You can later exclude this scope from monitoring by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to add to the exclusion scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Masks

The list contains name masks of the objects that the application excludes from the monitoring.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202412_1]

Exclusions by mask window

You can configure the exclusion of objects from monitoring based on name masks. The application does not scan the files with the names containing the specified masks. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 212444]

Configuring integration with Kaspersky Managed Detection and Response

To configure integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response (MDR), perform the following actions:

  • Make sure that the File Threat Protection and Behavior Detection components are enabled in the Kaspersky Endpoint Security policy.
  • In the Kaspersky Endpoint Security policy, enable the use of Kaspersky Security Network in extended mode.
  • In the Kaspersky Endpoint Security policy, enable integration with Managed Detection and Response and upload a BLOB configuration file, which is located in the ZIP archive of the MDR configuration file (see the instructions below).
  • In the Administration Console, configure Kaspersky Private Security Network for sending telemetry using a Kaspersky Security Network configuration file, which is located in the ZIP archive of the MDR configuration file (see the instructions below).

To configure Kaspersky Private Security Network for integration with Kaspersky Managed Detection and Response in Kaspersky Security Center:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Administration Console tree, select the Administration Server.
  3. In the Administration Server context menu, select Properties.
  4. In the Administration Server properties window, in the KSN proxy server section, select the KSN proxy server settings sub-section.
  5. Select the Use Administration Server as a proxy server check box to enable the KSN proxy server service.
  6. Select the Configure Private KSN check box.
  7. In the window that opens and displays a warning about the specific aspects of using the KSN proxy server on the distribution points with the previous version of the Network Agent installed, click OK.
  8. Click the File with KSN proxy server settings button.
  9. Select the configuration file with the pkcs7 extension and click Open.

    This configuration file is included in Kaspersky Managed Detection and Response distribution kit.

    By downloading Kaspersky Managed Detection and Response configuration file, you agree to automatically transmit data from the device with Kaspersky Endpoint Security installed to Kaspersky for processing. Do not load the configuration file if you do not agree that the transmitted data will be processed. For detailed description of the transmitted data, refer to Kaspersky Managed Detection and Response documentation.

  10. Click Apply.

To load the BLOB configuration file using Kaspersky Security Center:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder, open the folder with the name of the required administration group for which you want to configure the policy settings.
  3. In the workspace, select the Policies tab.
  4. Select the required policy and open the policy properties window in one of the following ways:
    • Double click the policy name.
    • In the context menu of the policy, select Properties.
  5. In the policy properties window, in the list on the left, select the Managed Detection and Response section in the General settings section.
  6. Select the Enable Managed Detection and Response check box.
  7. Click Download.
  8. In the window that opens, select the BLOB configuration file and click the Open button.

    The BLOB configuration file is included in Kaspersky Managed Detection and Response distribution kit.

    By downloading Kaspersky Managed Detection and Response configuration file, you agree to automatically transmit data from the device with Kaspersky Endpoint Security installed to Kaspersky for processing. Do not load the configuration file if you do not agree that the transmitted data will be processed. For detailed description of the transmitted data, refer to Kaspersky Managed Detection and Response documentation.

  9. Click Apply.
Page top

[Topic 214372]

Configuring KESL container settings

Kaspersky Endpoint Security distribution kit contains files for creating a container application (KESL container) for embedding into external systems in order to scan container images from image repositories.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KESL container functionality is not supported.

Interaction with the KESL container is implemented using the REST API. You can configure KESL container settings using the Administration Console.

For correct operation of KESL containers in Kaspersky Security Center, it is recommended to move the devices that correspond to the KESL containers to a separate administration group with its own policy. When the KESL container is stopped, these devices are automatically removed from the administration group, and the key that was used for these devices is released.

After deploying, activating and configuring the KESL container, it provides following functionalities in Kaspersky Security Center:

Other application functions and settings can be configured, but their configuration does not affect KESL container operation.

If KESL container was activated during deployment and is connected to Kaspersky Security Center, where automatic key distribution to managed devices is configured, this key will not be applied to the KESL container.

Page top

[Topic 198059]

Manually checking the connection with the Administration Server. Klnagchk utility

The Network Agent distribution kit includes the klnagchk utility, which is intended for checking connection to the Administration Server.

After installation of the Network Agent, the utility is located in the /opt/kaspersky/klnagent/bin directory in 32-bit operating systems and in the /opt/kaspersky/klnagent64/bin directory in 64-bit operating systems. Depending on the keys used in the command, the Network Agent performs the following actions when started:

  • Writes to the event log file or displays the values of the settings for connecting the Network Agent installed on the client device to the Administration Server.
  • Writes to the event log file or displays the Network Agent statistics (since its last launch) and the results of running the utility.
  • Attempts to establish a connection between Network Agent and the Administration Server.
  • If the connection fails, the utility sends an ICMP packet to check the status of the device where the Administration Server is installed.

Utility syntax

klnagchk [-logfile <file name>] [-sp] [-savecert <path to certificate file>] [-restart]

Arguments and keys

  • -logfile <file name>: write to an event log file both the values of the settings for connecting Network Agent to the Administration Server and the results of running the utility. If this option is not specified, the settings, results, and error messages are displayed on the screen.
  • -sp: show the password for user authentication on the proxy server. This setting is used if the connection to the Administration Server is established via a proxy server.
  • -savecert <file name>: save the certificate used to authenticate access to the Administration Server in the specified file.
  • -restart: restart Network Agent.
Page top

[Topic 201947]

Manually connecting to the Administration Server. Klmover utility

The Network Agent distribution kit includes the klmover utility, which is intended for managing the connection with the Administration Server.

After installation of the Network Agent, the utility is located in the /opt/kaspersky/klnagent/bin directory in 32-bit operating systems and in the /opt/kaspersky/klnagent64/bin directory in 64-bit operating systems. Depending on the keys used in the command, the Network Agent performs the following actions when started:

  • Connects Network Agent to the Administration Server with the specified settings.
  • Writes to an event log file or displays the operation results.

Utility syntax

klmover [-logfile <file name>] [-address <server address>] [-pn <port number>] [-ps <SSL port number>] [-nossl] [-cert <path to the certificate file>] [-silent] [-dupfix]

Arguments and options

  • -logfile <file name> – write the results of running the utility to the specified file. If this option is not specified, the results and error messages are sent to stdout.
  • -address <server address> – address of the Administration Server used for the connection. This can be the IP address, NetBIOS, or DNS name of the device.
  • -pn <port number> – number of the port over which a non-encrypted connection to the Administration Server is established. Port 14000 is used by default.
  • -ps <SSL port number> – number of the SSL port over which the encrypted connection to the Administration Server is established using the SSL protocol. Port 13000 is used by default.
  • -nossl – use a non-encrypted connection to the Administration Server. If this key is not specified, the Agent connects to the Administration Server over SSL.
  • -cert <path to certificate file> – use the specified certificate file for access authentication to the new Administration Server. If the option is not specified, Network Agent gets a certificate upon the first connection to the Administration Server.
  • -silent – start the utility in non-interactive mode. This may be useful if, for example, the utility is started from a startup script during user registration.
  • -dupfix – this option is used if the Network Agent installation method differs from the installation within the distribution kit; for example, if the Network Agent was restored from a disk image.
  • -cloningmode 1 – switch to cloning mode.
  • -cloningmode 0 – switch from cloning mode.
Page top

[Topic 256475]

Remote diagnostics of client devices. Kaspersky Security Center remote diagnostics utility

The utility for remote diagnostics of Kaspersky Security Center (hereinafter referred to as the remote diagnostics utility) is designed for remote execution of the following operations on client devices:

  • Enable or disable tracing.
  • Change the trace level.
  • Load a trace file.
  • Downloading a remote application installation log.
  • Downloads system (syslog) event logs.

The remote diagnostics utility is automatically installed on the device together with the Administration Console.

For more information about the remote diagnostics utility, refer to Kaspersky Security Center documentation.

To open the main window of the remote diagnostics utility for a client device, do as follows:

  1. Open the Administration Console of Kaspersky Security Center.
  2. In the Managed devices folder of the Administration Console tree, open the folder with the name of the administration group that includes the required device.
  3. In the workspace, select the Devices tab.
  4. In the list of managed devices, select the device to which you want to connect the remote diagnostics utility, and select External toolsRemote diagnostics in the device context menu.

    The main window of the Kaspersky Security Center remote diagnostics utility opens.

You can use remote device diagnostics to view the remote installation log.

To view the remote installation log on a device, do as follows:

  1. Open the main window of the remote diagnostics utility.
  2. In the main window of the remote diagnostics utility, click the Log in button.
  3. In the window that opens, in the objects tree, select the Remote installation logs folder.

Page top

[Topic 245583]

Remote application administration using Kaspersky Security Center Web Console and Kaspersky Security Center Cloud Console

This section contains information about managing Kaspersky Endpoint Security using Kaspersky Security Center Cloud Console and Kaspersky Security Center Web Console.

This description is provided for Kaspersky Security Center 14.2.

The Kaspersky Security Center Cloud Console is the cloud version of Kaspersky Security Center. This means that the Administration Server and other components of Kaspersky Security Center are installed in the cloud infrastructure of Kaspersky. Kaspersky Security Center Cloud Console is managed using the cloud-based Administration Console called Kaspersky Security Center Cloud Console. Interface of this console is similar to Kaspersky Security Center Web Console interface. For detailed information about Kaspersky Security Center Cloud Console, refer to the Kaspersky Security Center Cloud Console documentation.

The Kaspersky Security Center Cloud Console does not support managing the settings for integrating Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA).

Kaspersky Security Center Web Console (hereinafter also referred to as "Web Console") is a web interface for managing a protection system based on Kaspersky applications. You can work in Kaspersky Security Center Web Console using a browser on any device that has access to the Administration Server. For detailed information about Kaspersky Security Center Web Console, refer to Kaspersky Security Center documentation.

Kaspersky Security Center Web Console lets you do the following:

  • Monitor the status of your organization's security system.
  • Install Kaspersky applications on devices within your network.
  • Manage installed applications.
  • View reports on the security system status.

Kaspersky Endpoint Security is managed using Kaspersky Security Center Cloud Console and Kaspersky Security Center Web Console by means of Kaspersky Endpoint Security web administration plug-in.

To manage Kaspersky Endpoint Security operation using Kaspersky Security Center Cloud Console or Kaspersky Security Center Web Console, assign the devices, on which Kaspersky Endpoint Security is installed, to administration groups. You can create administration groups in Kaspersky Security Center before Kaspersky Endpoint Security installation and configure rules to automatically move the devices to administration groups. You can also manually move the devices to the administration groups after installing Kaspersky Endpoint Security (for details, refer to Kaspersky Security Center documentation).

In this Help section

Logging in and out of the Web Console and Cloud Console

Starting and stopping the application on a client device

Viewing the protection status of a device

Updating application databases and modules

Managing policies in the Web Console

Policy settings

Managing tasks in the Web Console

Task settings

Configuring integration with Kaspersky Managed Detection and Response

Configuring KESL container settings

Configuring remote diagnostics of client devices

Page top

[Topic 202114]

Logging in and out of the Web Console and Cloud Console

Kaspersky Security Center Web Console

To log in to the Web Console, you need to know the web address and the port number of the Administration Server specified during the Web Console installation (port 8080 is used by default). JavaScript must also be enabled in your browser.

To log in to Web Console:

  1. In your browser, go to the <Administration Server web address>:<port number> address.

    The login page is displayed.

  2. Enter the user name and password for your account.

    It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

  3. Click Log in.

    If the Administration Server is not responding, or if you enter incorrect credentials, an error message is displayed.

After logging in, a dashboard is displayed with the last language and theme used.

For more details about the Web Console interface, refer to Kaspersky Security Center documentation.

To log out of Web Console:

select <Account name>Exit in the lower left corner of the screen.

The Web Console is closed, and the login page is displayed.

Kaspersky Security Center Cloud Console

For the Kaspersky Security Center Cloud Console, use a web token to log in to your account on the Cloud Console portal.

For detailed information about Kaspersky Security Center Cloud Console, refer to the Kaspersky Security Center Cloud Console documentation.

Page top

[Topic 202131]

Starting and stopping the application on a client device

After installing Kaspersky Endpoint Security to a user device, the application is started automatically. Subsequently, the application is launched by default immediately after the operating system starts.

You can monitor the application operation status by using the Protection status web widget in the Monitoring and reports / Dashboard window.

To start or stop the application remotely:

  1. In the main window of the Web Console, select DevicesManaged devices.

    The list of managed devices opens.

  2. In the list, select the device on which you want to start or stop the application, and click the link with the device name to open the device properties window.
  3. Select the Applications tab.
  4. Select the Kaspersky Endpoint Security 12.0 for Linux check box.
  5. Click the Start or Stop button.
Page top

[Topic 202138]

Viewing the protection status of a device

To view the protection status of a device:

  1. In the main window of the Web Console, select DevicesManaged devices.

    The list of managed devices opens.

  2. In the list, select the device for which you want to view information, and click the link with the device name to open the device properties window.
  3. On the General tab, select the Protection section.

The Protection section displays the following information about the selected device:

  • Visible in the network is the visibility of the selected device in the network: Yes or No.
  • Device status represents a current status of the selected device, such as OK, Critical, or Warning.
  • Status description represents the reasons for changing the status of the device to Critical or Warning.
  • Protection status represents a status of the File Threat Protection task, such as Running, Stopped, or Paused.
  • Last full check represents date and time when the last full scan task was completed on the selected device.
  • Viruses detected represents a total number of malicious objects detected on the selected device (detected threat counter) since Kaspersky Endpoint Security was installed.
  • Objects that failed disinfection represents a number of infected objects that Kaspersky Endpoint Security was unable to disinfect.
Page top

[Topic 202132]

Updating application databases and modules

The procedure for updating Kaspersky Endpoint Security databases and modules depends on application mode. This section describes how to update the application in standalone mode. If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the application databases and modules cannot be updated using the task created in Kaspersky Security Center. Updates are performed using a local predefined task.

Updating the databases and application modules of Kaspersky Endpoint Security ensures up-to-date protection on your device. New viruses, malware, and other types of threats appear worldwide on a daily basis. Kaspersky Endpoint Security databases contain information about threats and ways of neutralizing them. To detect threats quickly, you are urged to regularly update the application databases and modules.

The following objects are updated on users' devices:

  • Application databases. Application databases include databases of malware signatures, a description of network attacks, databases of malicious and phishing web addresses, databases of banners, spam databases, and other data.
  • Application modules. Module updates are intended to eliminate vulnerabilities in the application and to improve methods of protecting devices. Module updates may change the behavior of application components and add new capabilities.

Kaspersky Endpoint Security supports the following scenarios for updating databases and application modules:

  • Update from Kaspersky servers. Kaspersky update servers are located in different countries around the world, which ensures a high reliability of updates. If an update cannot be performed from one server, Kaspersky Endpoint Security switches over to the next server.
  • Centralized update Centralized update reduces external Internet traffic, and provides for convenient monitoring of the update.

    Centralized update consists of the following steps:

    1. Download the update package to a repository within the organization's network.

      The update package is downloaded to the repository by the Download updates to Administration Server repository task of the Administration Server.

    2. Distribute the update package to client devices

      The update package is distributed to the client devices by the Update task of Kaspersky Endpoint Security. You can create an unlimited number of update tasks for each administration group.

For the Web Console, by default, the list of update sources contains Kaspersky update servers and Kaspersky Security Center Administration Server. For the Kaspersky Security Center Cloud Console, the default list of update sources contains distribution points and Kaspersky update servers. For more details about distribution points, refer to Kaspersky Security Center Cloud Console documentation.

You can add other update sources to the list. You can specify FTP-, HTTP-, or HTTPS servers as update sources. If an update cannot be performed from an update source, Kaspersky Endpoint Security switches to the next update source.

Updates are downloaded from Kaspersky update servers or from other FTP, HTTP, or HTTPS servers over standard network protocols. If connection to a proxy server is required to access the update sources, specify the proxy server settings in the Kaspersky Endpoint Security policy settings.

In this section

Updating from the Administration Server repository

Updating using Kaspersky Update Utility

Using a proxy server for updates

Page top

[Topic 247142]

Updating from the Administration Server repository

To save Internet traffic, you can configure updates of application databases and modules on devices on the organization's LAN from a server repository. To do this, in Kaspersky Security Center you need to configure downloading the update package from Kaspersky update servers in the Administration Server repository. Other devices on the organization's LAN will be able to receive the update package from the server repository.

Configuring application database and module updates from the server repository consists of the following steps:

  1. Download application databases and modules to the Administration Server repository using the Download updates to the Administration Server repository task of Kaspersky Security Center.
  2. Configure updates of application databases and modules from the Administration Server repository on the remaining hosts using the Update task.

To configure updates of application databases and modules from the Administration Server repository:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. In the list of tasks, select the Update task for Kaspersky Endpoint Security and click the link with the task name to open the task properties window.

    The Update task is created automatically by the Web Console Quick Start Wizard. To create the Update task, install Kaspersky Endpoint Security web plug-in while running the Wizard.

  3. In the task properties window, select the Application settings tab.
  4. In the list on the left, select the Database update source section.

    The task settings are displayed in the right part of the window.

  5. In the Database update source section, select the Kaspersky Security Center Administration Server option.
  6. Select the Use Kaspersky update servers if other update sources are not available check box if you want to the Update task to use Kaspersky update servers if the Administration Server repository is unavailable.
  7. Click Save.
Page top

[Topic 202134]

Updating using Kaspersky Update Utility

To reduce Internet traffic, you can configure updates of application databases and modules on devices of the organization's LAN from a shared directory by using the Kaspersky Update Utility. For this purpose, one of the devices in the organization's LAN must receive update packages from the Kaspersky Security Center Administration Server or from Kaspersky update servers and use the utility to copy the received update packages to the shared directory. Other devices on the organization's LAN will be able to receive the update package from this shared directory.

Configuring application database and module updates from a shared directory consists of the following steps:

  1. Install Kaspersky Update Utility on one of the devices of the organization's LAN.
  2. Configure copying of the update package to the shared directory in the Kaspersky Update Utility settings.
  3. Configure application database and module updates from the specified shared directory to the remaining devices on the organization's LAN.

You can download the Kaspersky Update Utility distribution kit from the Kaspersky Technical Support website. After installing the utility, select the update source (for example, the Administration Server repository) and the shared directory to which the Kaspersky Update Utility will copy update packages. For detailed information about using Kaspersky Update Utility, refer to the Kaspersky Knowledge Base.

To configure updates from a shared directory:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. In the list of tasks, select the Update task for Kaspersky Endpoint Security and click the link with the task name to open the task properties window.

    The Update task is created automatically by the Web Console Quick Start Wizard. To create the Update task, install Kaspersky Endpoint Security web plug-in while running the Wizard.

  3. In the task properties window, select the Application settings tab.
  4. In the list on the left, select the Database update source section.

    The task settings are displayed in the right part of the window.

  5. In the Database updates source section, select the Other sources on the local or global network option.
  6. In the table of update sources, click the Add button.
  7. In the Update source field, specify the path to the shared directory.

    The source address must match the address indicated in the Kaspersky Update Utility settings.

  8. Select the Use this source check box and click OK.
  9. In the table, set the order of the update sources using the Up and Down buttons.
  10. Click Save.
Page top

[Topic 202137]

Using a proxy server for updates

You may be required to specify proxy server settings to download database and application module updates from the update source. If there are multiple update sources, proxy server settings are applied for all sources. If a proxy server is not needed for some update sources, you can disable the use of a proxy server in Kaspersky Endpoint Security policy settings. The application will also use a proxy server to access Kaspersky Security Network and activation servers.

To enable use of a proxy server for a specific administration group:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.
  2. In the list of policies, select the Kaspersky Endpoint Security policy for the administration group on whose devices you want to disable the use of a proxy server. Click the link with the policy name to open the policy properties window.
  3. In the policy properties window, select the Application settings tab.
  4. Select the General settingsProxy server settings section.
  5. In the Proxy server settings section, select the Use specified proxy server settings and specify the required proxy server settings.
  6. Click OK.
  7. Click Save.
Page top

[Topic 202218]

Managing policies in the Web Console

A policy is a set of Kaspersky Endpoint Security operation settings applied to an administration group. You can use policies to apply identical Kaspersky Endpoint Security settings to all client devices within an administration group.

Multiple policies with different values of the settings can be configured for a single application. However, there can be only one active policy at a time for an application within an administration group. When you create a new policy, all other policies within an administration group become inactive. You can change the policy status later.

Policies have a hierarchy, similarly to administration groups. By default, a child policy inherits the settings from the parent policy. A child policy is a policy of a nested hierarchy level, that is, a policy for nested administration groups and secondary Administration Servers. You can enable inheritance of the settings from the parent policy.

You can locally modify the values of the settings specified by the policy for individual devices within the administration group, if modification of these settings is not prohibited by the policy.

Each policy setting has a "lock" attribute that indicates whether child policy settings and local application settings can be modified. The "lock" status of a setting within a policy determines whether or not an application setting on a client device can be edited:

  • When a setting is "locked" (lock_policy), you cannot edit the setting locally. The setting value specified by the policy is used for all client devices within the administration group.
  • When a setting is "unlocked" (unlock), you can edit the setting locally. For all client devices in the administration group, the settings specified locally are used. The settings specified in the policy are not applied.

After the policy is applied for the first time, the application settings change in accordance with the policy settings.

You can perform the following operations with the policies:

You can also create policy profiles. A policy profile may contain settings that differ from the "base" policy settings and apply to client devices when the configured conditions (activation rules) are met. Using policy profiles allows you to flexibly configure operation settings for different devices. You can create and configure profiles in the Policy profiles section of the policy properties.

For general information on working with policies and policy profiles, refer to Kaspersky Security Center documentation.

In this section

Creating a policy

Editing policy settings

Changing policy status

Actions with policies

Deleting a policy

Page top

[Topic 202224]

Creating a policy

To create a policy:

  1. In the main window of the Web Console, select DevicesPolicies and policy profiles.

    The list of policies opens.

  2. Select the administration group containing client devices to which the policy should be applied. To do so, click the link in the Current path field in the upper part of the window and select an administration group in the window that opens.

    The list displays only the policies configured for the selected administration group.

  3. Click Add.

    The Policy Wizard starts.

  4. In the drop-down list, select Kaspersky Endpoint Security 12.0 for Linux.

    Proceed to the next step of the wizard.

  5. Decide whether you want to use Kaspersky Security Network. Carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you agree with all the terms and conditions of the Statement and want the application to use Kaspersky Security Network, select I confirm that I have fully read, understand, and accept the terms and conditions of Kaspersky Security Network Statement.
    • If you do not want to use Kaspersky Security Network, select I do not accept the terms and conditions of the Kaspersky Security Network Statement and confirm your decision in the window that opens.

    Refusal to use Kaspersky Security Network does not interrupt the policy creation process. At any time, you can enable or disable use of Kaspersky Security Network or change the KSN mode for managed devices in the policy settings.

    Proceed to the next step of the wizard.

  6. Specify the Kaspersky Endpoint Security usage mode:
    • Standalone mode – the application is used to protect devices running Linux operating systems.
    • Light Agent mode for protecting virtual environments – as part of the Kaspersky Security for Virtualization Light Agent solution, the application is used to protect virtual machines running Linux guest operating systems.
  7. If you are using the application in Light Agent mode to protect virtual environments, configure the SVM discovery settings:
    1. Select the method that Light Agents use to discover SVMs available for connection.
      • Use the Integration Server

        If this option is selected, Light Agent connects to Integration Server to get a list of SVMs available for connection and their details.

      • Use a custom list of SVM addresses

        If this option is selected, you can specify a list of SVMs that Light Agents managed by this policy can connect to. Light agents will only connect to SVMs specified in the list.

      If you select the Use a custom list of SVM addresses option, the Light Agent is using the extended SVM selection algorithm, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. In the SVM selection algorithm section, you need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

    2. If you select Integration Server, the wizard displays the current settings for connecting Light Agents to the Integration Server: address and port for connecting. If necessary, specify new connection settings:
      1. Click the Configure button and specify new connection settings in the window that opens:
        • Address

          IP address in IPv4 format or fully qualified domain name (FQDN) of the device on which the Integration Server is installed.

          If a NetBIOS name, "localhost", or 127.0.0.1 is specified as the address, the connection to the Integration Server fails with an error.

        • Port

          Port for connecting to the Integration Server.

          Port 7271 is used by default.

      2. Click the Check button.
      3. The web plug-in checks the SSL certificate received from the Integration Server. If the certificate contains an error or is not trusted, a corresponding message is displayed in the Connection to the Integration Server window.

        You can view information about the certificate received from the Integration Server by clicking on the View the received certificate line. If you encounter problems with an SSL certificate, we recommend to make sure that the data transmission channel you are using is secure.

        To save the received certificate and continue connecting to the Integration Server, in the Select an action block, select the Ignore option.

      4. Specify the password of the Integration Server administrator (password of the admin account) and click the Test button.

        The New Policy Wizard connects to the Integration Server. If the connection fails, an error message appears in the window. If the connection succeeds, the Connection to the Integration Server window closes, and the Connection to the Integration Server field of the New Policy Wizard window shows the Connected status.

    3. If you select a manually defined list of SVM addresses, the window displays a list of SVMs that Light Agents managed by this policy can connect to. To add an SVM to the list, click the Add button and in the window that opens specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the SVM. You can enter multiple IP addresses or FQDNs of SVMs on a new line.

      Specify only fully qualified domain names (FQDNs) that map to a single IP address. Using a fully qualified domain name that corresponds to multiple IP addresses can lead to errors in the application.

      You can delete addresses selected in the list by clicking the Delete button.

    Proceed to the next step of the wizard.

  8. The General tab of the new policy settings window opens. Specify a name for the new policy.

    You can also configure the following policy settings:

    • Policy status:
      • Active. The policy that is currently applied to the device. If this option is selected, this policy becomes active on the device upon the next device synchronization with the Administration Server. This option is selected by default.
      • Inactive. The policy that is not currently applied to the device. If this option is selected, the policy becomes inactive but remains in the Policies folder. You can activate the inactive policy later.
      • Out-of-office. Policy that becomes active when the device leaves the corporate network. If this option is selected, the policy becomes active when the device leaves the organization network.
    • Policy settings inheritance:
      • Inherit settings from parent policy. If this option is enabled, the policy settings values are inherited from the upper-level group policy and, therefore, are locked. The check toggle button is switched on by default.
      • Enforce settings inheritance for child policies If this option is enabled, the settings values of the child policies are locked. The toggle button is switched off by default.

    For general information about the policy settings, refer to Kaspersky Security Center documentation.

  9. On the Application settings tab, you can modify the policy settings.
  10. Click Save.

The created policy will be displayed in the list of policies. You can change the policy settings later. For general information about managing policies, refer to Kaspersky Security Center documentation.

Page top

[Topic 202225]

Editing policy settings

To edit policy settings:

  1. In the main window of the Web Console, select DevicesPolicies and policy profiles.

    The list of policies opens.

  2. Select the administration group to which the policy is applied. To do so, click the link in the Current path field in the upper part of the window and select an administration group in the window that opens.

    The list displays only the policies configured for the selected administration group.

  3. Select the policy for which you want to modify the settings, and click the link with the policy name to open the policy properties window.
  4. Edit the policy settings.
  5. Click Save.

The policy is saved with the updated settings.

Page top

[Topic 202227]

Changing policy status

To change the policy status:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list, select the policy for which you want to modify the status, and click the link with the policy name to open the policy properties window.
  3. On the General tab, in the Policy status section, select the required status:
    • Active. The policy that is currently applied to the device.

    If this option is selected, this policy becomes active on the device upon the next device synchronization with the Administration Server. This option is selected by default.

    • Inactive. The policy that is not currently applied to the device.

    If this option is selected, the policy becomes inactive but remains in the Policies folder. You can activate the inactive policy later.

    • Out-of-office. Policy that becomes active when the device leaves the corporate network.

    If this option is selected, the policy becomes active when the device leaves the organization network.

  4. Click Save.

The policy status is changed.

Page top

[Topic 246014]

Actions with policies

To copy, move, export, or import a policy:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list of policies, check the box next to the name of the required policy and click the action button above the list of policies.
Page top

[Topic 202226]

Deleting a policy

To delete a policy:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list of policies, select a check box next to the policy that you want to delete.

    You can select several policies to delete them simultaneously.

  3. Click the Delete button above the list of policies.
  4. Confirm the deletion.
Page top

[Topic 236891]

File Threat Protection.

File Threat Protection prevents infection of the file system on the user device. File Threat Protection starts automatically with the default settings upon Kaspersky Endpoint Security start. It resides in the device operating memory and scans all files that are opened, saved, and launched.

File Threat Protection settings

Setting

Description

File Threat Protection enabled / disabled

This toggle button enables or disables File Threat Protection on all managed devices.

The check toggle button is switched on by default.

File Threat Protection mode

In this drop-down list, you can select the File Threat Protection mode:

  • Smart check (default value) – scan a file when there is an attempt to open it and scan it again when there is an attempt to close it if the file has been modified. If a process accesses and modifies a file multiple times in a certain period, the application scans the file again only when the process closes it for the last time.
  • When opened – scan the file on an attempt to open it for reading, execution, or modification.
  • When opened and modified – scan a file on an attempt to open it, and scan it again on an attempt to close it if the file has been modified.

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be moved to the Storage.
  • Remove the object. A copy of the infected object will be moved to the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Block access to the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be moved to the Storage.
  • Remove the object. A copy of the infected object will be moved to the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Block access to the object (default value).

Scan scopes

Clicking the Configure scan scopes link opens the Scan scopes window.

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by enabling and configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings.

If the check box is cleared, the application does not scan the archives.

This check box is cleared by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

This check box is cleared by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip text files

Temporary exclusion of files in text format from scans.

If the check box is selected, Kaspersky Endpoint Security does not scan text files if they are used by the same process within 10 minutes after the most recent scan. This setting makes it possible to optimize scans of application logs.

If this check box is unselected, Kaspersky Endpoint Security scans text files.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

The default value is 60.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

The default value is 0.

Log clean objects

This check box enables or disables logging of the ObjectProcessed event.

If this check box is selected, the application logs the ObjectProcessed event for all scanned objects.

If the check box is cleared, the application does not log the event.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables logging of the ObjectNotProcessed event if a file cannot be processed during scan.

If this check box is selected, the application logs the ObjectNotProcessed event.

If the check box is cleared, the application does not log the event.

This check box is cleared by default.

Log packed objects

This check box enables or disables logging of the PackedObjectDetected event for all packed objects that are detected.

If this check box is selected, the application logs the PackedObjectDetected event.

If the check box is cleared, the application does not log the event.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during an object scan.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of quality of protection and impact on the performance of protected servers.

Page top

[Topic 202257_4]

Scan scopes window

The table contains the scan scopes. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Scan scope settings

Setting

Description

Scope name

Scan scope name.

Path

Path to the directory that the application scans.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 248956]

Add scan scope window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scope name

Field for entering the scan scope name. This name is displayed in the Scan scopes table in the Scan settings section.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

You can select the type of file system in the drop-down list:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Shared or Mounted type is selected in the drop-down list of file systems.

Path

This is the entry field for specifying the path to the directory that you want to include in the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

This field is available if the Local type is selected in the drop-down list of file systems.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 249321]

Scan exclusions

Scan exclusion is a set of conditions. When these conditions are met, Kaspersky Endpoint Security does not scan the objects for viruses and other malware. You can also exclude objects by masks and threat names, and configure exclusions for processes.

Settings of scan exclusions

Setting

Description

Exclusion scopes

Clicking the Configure exclusions link opens the Exclusion scopes window. In this window, you can define the list of scan exclusions.

Exclusions by mask

Clicking the Configure exclusions by mask link opens the Exclusions by mask window. In this window, you can configure the exclusion of objects from scans by name mask.

Exclusions by threat name

Clicking the Configure exclusions by threat name link opens the Exclusions by threat name window. In this window, you can configure the exclusion of objects from scans based on threat name.

Exclusions by process

Clicking the Configure exclusions by process link opens the Exclusions by process window. In this window, you can exclude the activity of processes.

Page top

[Topic 197613]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 248957]

Add exclusion scope window

In this window, you can add and configure exclusion scopes.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables the exclusion of the scope when the application is running.

If the check box is selected, the application excludes this scope from scan or protection during its operation.

If the check box is cleared, the application includes this scope in scan or protection during its operation. You can later exclude this scope from scan or protection by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

In this drop-down list, you can select the type of file system where the directories that you want to add to scan exclusions are located:

  • Local, for local directories.
  • Mounted, for remote directories mounted on the device.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Mounted type is selected in the drop-down list of file systems.

Path

Entry field for the path to the directory that you want to add to the exclusion scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default. The application excludes all directories of the local file system from scan.

This field is available if the Local type is selected in the drop-down list of file systems.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are only applied to objects in the directory specified in the Path field.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202356]

Exclusions by mask window

You can configure the exclusion of objects from scans based on name mask. The application will not scan files whose names contain the specified mask. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 246682]

Exclusions by threat name window

You can configure the exclusion of objects from scans based on threat name. The application will not block the specified threats. By default, the list of threat names is empty.

You can add, edit, and delete threat names.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected threat from the exclusion list.

This button is available if at least one threat name is selected in the list.

Clicking the threat name in the table opens the Threat name window. In this window, you can edit the name of the threat to be excluded from a scan.

Clicking the Add button opens the Threat name window. In this window, you can define the name of the threat to be excluded from a scan.

Page top

[Topic 249195]

Exclusions by process window

The table contains the exclusion scopes for exclusion by process The exclusion scope for exclusion by process lets you exclude from scans the activity of the indicated process and files modified by the indicated process. By default, the table includes two exclusion scopes that contain paths to the Network Agents. You can remove these exclusions, if necessary.

Exclusion scope settings for exclusion by process

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Full path to excluded process.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 248959]

Trusted process window

In this window, you can add and configure exclusion scopes for exclusion by process.

Exclusion scope settings

Setting

Description

Process-based exclusion scope name

Field for entering the Process-based exclusion scope name. This name will be displayed in a table in the Exclusions by process window.

The entry field must not be blank.

Use / Do not use this exclusion

This toggle button enables or disables this scan scope exclusion.

The check toggle button is switched on by default.

Apply to child processes

Exclude child processes of the excluded process indicated by the Path to excluded process setting.

This check box is cleared by default.

Path to excluded process

Full path to the process you want to exclude from scans.

File system, access protocol, and path

This group of settings lets you set scan exclusions for files modified by the process.

In the drop-down list of file systems, you can select the type of file system of the directories to be excluded from scans:

  • Local, for local directories.
  • Mounted – mounted directories.
  • Shared displays server file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared displays all server file system resources accessible via the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

     

The Access protocol drop-down list is available if Mounted or Shared is selected in the drop-down list of file systems.

Path

In the input field, you can enter the path to the directory that you want to add to the exclusion scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

This field is available if the Local type is selected in the drop-down list of file systems.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are applied to objects only inside the directory indicated in the File system, access protocol, and path block.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202310]

Firewall Management

The operating system's firewall protects personal data stored on the user's device by blocking most threats to the operating system when the device is connected to the Internet or local network.

The operating system's firewall can detect all network connections on the user's device and provide a list of their IP addresses. The Firewall Management task lets you set the status of these network connections by configuring network packet rules.

This feature is not supported in the KESL container.

Configuring network packet rules lets you specify the desired level of the device protection, from blocking Internet access for all applications to allowing unlimited access. All outbound connections are allowed by default, unless corresponding blocking rules for the Firewall Management task are specified.

It is recommended to disable other operating system firewall management tools before enabling the Firewall Management component.

Firewall Management settings

Setting

Description

Firewall Management enabled / disabled

This toggle button enables or disables Firewall Management.

The toggle button is switched off by default.

Network packet rules

Clicking the Configure network packet rules link opens the Network packet rules window. In this window, you can configure the list of network packet rules that are applied by the Firewall Management component when it detects the network connection attempt.

Available networks

Clicking the Configure available networks link opens the Available networks window. In this window, you can configure the list of networks that the Firewall Management component will monitor.

Incoming connections

In this drop-down list, you can select the action to be performed for incoming network connections:

  • Allow network connections (default value).
  • Block network connections.

Incoming packets

In this drop-down list you can select the action to be performed for incoming packets:

  • Allow incoming packets (default value).
  • Block incoming packets.

Always add allowing rules for Network Agent ports

This check box enables or disables automatic adding allowing rules for Network Agent ports.

The check box is selected by default.

Page top

[Topic 202312_1]

Network packet rules window

The Network packet rules table contains network packet rules that the Firewall Management component uses for network activity monitoring. You can configure the settings described in the table below for network packet rules.

Network packet rules settings

Setting

Description

Name

Network packet rule name.

Action

Action to be performed by Firewall Management when it detects the network activity.

Local address

Network addresses of devices that have Kaspersky Endpoint Security installed and can send and/or receive network packets.

Remote address

Network addresses of remote devices that can send and/or receive network packets.

Logging

This column shows if the application logs actions of the network packet rule.

If the value is Yes, the application logs the actions of the network packet rule.

If the value is No, the application does not log the actions of the network packet rule.

By default, the table of network packet rules is empty.

You can add, edit, delete, move up, and move down network packet rules in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202313]

Network packet rule window

In this window, you can configure the network packet rule.

Network packet rule settings

Setting

Description

Rule name

The field for entering the name of the network packet rule.

Action

In the drop-down list, you can select an action to be performed by the Firewall Management component when it detects network activity:

  • Block network activity.
  • Allow network activity (default value).

Protocol

In the drop-down list, you can select the type of data transfer protocol for which you want to monitor network activity:

  • Any (default value)
  • GRE
  • ICMP
  • ICMPv6
  • IGMP
  • TCP
  • UDP

Specify ICMP type

This check box lets you specify the ICMP type. The Firewall Management component monitors messages of the specified type sent by the host or gateway.

If this check box is selected, the field for entering the ICMP type is displayed.

This check box is displayed only if ICMP or ICMPv6 data transfer protocol is selected in the Protocol drop-down list.

This check box is cleared by default.

Specify ICMP code

This check box lets you specify the ICMP code. The Firewall Management component monitors messages of the type specified in the field under the ICMP type check box, with the code specified in the field under the ICMP code check box, and sent by the host or gateway.

If this check box is selected, the field for entering the ICMP code is displayed.

This check box is displayed only if ICMP or ICMPv6 data transfer protocol is selected in the Protocol drop-down list. It is available only if the Specify ICMP type check box is selected.

This check box is cleared by default.

Direction

In this drop-down list, you can specify the direction of the monitored network activity:

  • Incoming packets (default value). If this option is selected, the Firewall Management component monitors incoming packets.
  • Incoming. If this option is selected, the Firewall Management component monitors incoming network activity.
  • Incoming/Outgoing. If this option is selected, the Firewall Management component monitors both incoming and outgoing network activity.
  • Incoming/Outgoing packets. If this option is selected, the Firewall Management component monitors both incoming and outgoing packets.
  • Outgoing packets. If this option is selected, the Firewall Management component monitors outgoing packets.
  • Outgoing. If this option is selected, the Firewall Management component monitors outgoing network activity.

Remote address

In this drop-down list, you can specify network addresses of the remote devices that can send and receive network packets:

  • Any address (default value). If this option is selected, the network rule controls network packets sent and received by remote devices with any IP address.
  • All subnet addresses. If this option is selected, the network rule controls network packets sent and received by remote devices with the IP addresses associated with the selected network type: Public networks, Local networks, or Trusted networks.
  • Specified address. If this option is selected, the network rule controls network packets sent and received by the remote devices with IP addresses specified in the Address field.

Specify remote ports

This check box allows you to specify the port numbers of the remote devices between which the connection must be monitored.

If this check box is selected, the field for entering port numbers is displayed.

This check box is displayed only if TCP or UDP data transfer protocol is selected in the Protocol drop-down list.

This check box is cleared by default.

Local address

In this drop-down list, you can specify the network addresses of the devices with Kaspersky Endpoint Security installed that can send and receive network packets:

  • Any address (default value). If this option is selected, the network rule controls sending and receiving of network packets by the devices with Kaspersky Endpoint Security installed and with any IP address.
  • Specified address. If this option is selected, the network rule controls the specified in the Address field network addresses of the devices with Kaspersky Endpoint Security installed that can send and receive network packets.

Specify local ports

This check box allows you to specify the port numbers of the local devices between which the connection must be monitored.

If this check box is selected, the field for entering port numbers is displayed.

This check box is displayed only if TCP or UDP data transfer protocol is selected in the Protocol drop-down list.

This check box is cleared by default.

Log events

This check box lets you specify whether the actions of the network rule are recorded in the report.

If the check box is selected, the application writes the actions of the network rule to the report.

If the check box is cleared, the application does not write the actions of the network rule to the report.

This check box is cleared by default.

Page top

[Topic 210497_1]

Available networks window

The Available networks table contains the networks controlled by the Firewall Management component. The table of available networks is empty by default.

Available networks settings

Setting

Description

IP address

Network IP address.

Network type

Network type (Public network, Local network, or Trusted network).

You can add, edit, and delete available networks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 214875_1]

Network connection window

In this window, you can configure the network connection that the Firewall Management component will monitor.

Network connection

Setting

Description

IP address

The field for entering IP address of the network.

Network type

You can select the type of the network:

  • Public
  • Local
  • Trusted

     

Page top

[Topic 234620]

Web Threat Protection

While the Web Threat Protection component is running, Kaspersky Endpoint Security scans inbound traffic and prevents downloads of malicious files from the Internet and also blocks phishing, adware, or other malicious websites.

This feature is not supported in the KESL container.

The application scans HTTP, HTTPS, and FTP traffic. Also, the application scans websites and IP addresses. You can specify the network ports or network port ranges to be monitored

To monitor HTTPS traffic, enable encrypted connection scans. To monitor FTP traffic, select the Monitor all network ports check box.

Web Threat Protection settings

Setting

Description

Web Threat Protection enabled / disabled

This toggle button enables or disables the Web Threat Protection component.

The toggle button is switched off by default.

Action on threat detection

In this section, you can specify the action that the application performs on the web resource where the dangerous object is detected:

  • Inform the user when a dangerous object is detected in web traffic. Web Threat Protection allows this object to be downloaded to the device. At that, the application logs the information about the dangerous object and adds it to the list of active threats.
  • Block access to all dangerous objects detected in web traffic, display a notification about the blocked access attempts, and log information about the dangerous objects (default value).

Detect malicious objects

This check box enables or disables checking of links against the databases of malicious web addresses.

The check box is selected by default.

Detect phishing links

This check box enables or disables checking of links against the databases of phishing web addresses.

The check box is selected by default.

Use heuristic analysis for detecting phishing links

This check box enables or disables the use of heuristic analysis for detecting phishing links.

This check box is available if the Detect phishing links check box is selected, and is selected by default.

Detect adware

This check box enables or disables checking links against the databases of adware web addresses.

This check box is cleared by default.

Detect legitimate applications that may be used by hackers to harm devices or data

This check box enables or disables checking links against the databases of legitimate applications that can be used by hackers to harm devices or data.

This check box is cleared by default.

Trusted web addresses

This table contains addresses of URLs and web pages whose content you consider trusted.

You can only add HTTP/HTTPS web addresses to the list of trusted web addresses.

You can use masks to specify web addresses. Masks are not supported to specify IP addresses.

When creating an address mask, use an asterisk (*) as a placeholder for one or more characters. If you enter the *abc* address mask, it is applied to all web resources that contain the "abc" sequence (for example, www.virus.com/download_virus/page_0-9abcdef.html). To include the asterisk in the address mask as a character, but not as a mask, enter the * character twice (for example, www.virus.com/**/page_0-9abcdef.html means www.virus.com/*/page_0-9abcdef.html).

By default, the table is empty.

You can add, edit, and remove web addresses in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202328_1]

Web address window

In this window, you can add a web address or a web address mask to the list of trusted web addresses.

You can add only HTTP/HTTPS web addresses to the list of trusted web addresses. You can use masks to specify web addresses. Masks are not supported to specify IP addresses.

When creating an address mask, use an asterisk (*) as a placeholder for one or more characters. If you enter the *abc* address mask, it is applied to all web resources that contain the "abc" sequence (for example, www.virus.com/download_virus/page_0-9abcdef.html). To include the asterisk in the address mask as a character, but not as a mask, enter the * character twice (for example, www.virus.com/**/page_0-9abcdef.html means www.virus.com/*/page_0-9abcdef.html).

Page top

[Topic 11396]

Network Threat Protection

While the Network Threat Protection component is running, the application scans inbound network traffic for activity that is typical for network attacks. Network Threat Protection is started by default when the application starts.

This feature is not supported in the KESL container.

The application receives the numbers of the TCP ports from the current application databases and scans incoming traffic for these ports. Upon detecting an attempt of a network attack that targets your device, the application blocks network activity from the attacking device and logs an event about the detected network activity.

To scan network traffic, the Network Threat Protection task receives port numbers from the application databases and accepts connections via all these ports. During the network scan process, it may look like an open port on the device, even if no application on the system is listening to this port. It is recommended to close unused ports by means of a firewall.

Network Threat Protection settings

Setting

Description

Network Threat Protection enabled / disabled

This toggle button enables or disables Network Threat Protection.

The check toggle button is switched on by default.

Action on threat detection

Actions performed upon detection of network activity that is typical of network attacks.

  • Inform user. The application allows network activity and logs information about detected network activity.
  • Block network activity from an attacking device and log information about detected network activity (default value).

Blocking attacking devices enabled / disabled

This toggle button enables or disables blocking network activity when a network attack attempt is detected.

The check toggle button is switched on by default.

Block the attacking device for (min)

In this field you can specify the duration an attacking device is blocked in minutes. After the specified time, Kaspersky Endpoint Security allows network activity from this device.

Available values: integer from 1 to 32768.

Default value: 60.

Exclusions

The table contains a list of IP addresses. Network attacks from these addresses will not be blocked. By default, the list is empty.

You can add, edit, and remove IP addresses in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202336_1]

IP address window

In this window, you can add and edit IP addresses. Network attacks from these IP addresses will not be blocked by Kaspersky Endpoint Security.

IP addresses

Setting

Description

Enter an IP address

Entry field for an IP address.

You can specify IP addresses in IPv4 and IPv6 formats.

Page top

[Topic 246795]

Kaspersky Security Network

To increase the protection of devices and user data, Kaspersky Endpoint Security can use Kaspersky cloud-based knowledge base Kaspersky Security Network (KSN) to check the reputation of files, Internet resources, and software. Using Kaspersky Security Network data ensures a faster response to various threats, high protection component performance, and fewer false positives.

Use of Kaspersky Security Network is voluntary. Kaspersky Endpoint Security prompts you to enable KSN usage during installation. You can start or stop using KSN at any time.

Kaspersky Security Network infrastructure solutions

Kaspersky Endpoint Security supports the following infrastructure solutions to work with Kaspersky reputation databases:

  • Kaspersky Security Network (KSN) – A solution that receives information from Kaspersky and sends data about objects detected on user devices to Kaspersky for additional verification by Kaspersky analysts and to add to reputation and statistical databases.
  • Kaspersky Private Security Network (KPSN) – A solution that allows users of devices with Kaspersky Endpoint Security installed to access the reputation databases of Kaspersky, as well as other statistical data, without sending data to Kaspersky from their devices. KPSN is designed for corporate clients who can't use Kaspersky Security Network, for example, for the following reasons:
    • No connection of local workplaces to the Internet
    • Legal prohibition or corporate security restrictions on sending any data outside the country or the organization's local network

After changing the Kaspersky Endpoint Security license, submit the details of the new key to the service provider in order to be able to use KPSN. Otherwise, an authentication error will prevent data exchange with KPSN.

Kaspersky Security Network usage options:

There are two options for using KSN:

  • Extended KSN mode – you can receive information from the Kaspersky knowledge base, while Kaspersky Endpoint Security automatically sends statistical information to KSN that it obtained during its operation. The application can also send to Kaspersky for additional scanning certain files (or parts of files) that intruders can use to harm the device or data.
  • Basic KSN mode – you can receive information from the Kaspersky knowledge base, but Kaspersky Endpoint Security does not send anonymous statistics and data about the types and sources of threats.

You can select a different Kaspersky Security Network usage option at any time.

No personal data is collected, processed, or stored. Detailed information about the storage, and destruction, and/or submission to Kaspersky of statistical information generated during participation in KSN is available in the Kaspersky Security Network Statement and on Kaspersky's website.

You can read the text of the Kaspersky Security Network Statement in the Kaspersky Security Network Statement window, which can be opened by clicking the Kaspersky Security Network Statement link.

Cloud mode for Kaspersky Endpoint Security

If Kaspersky Endpoint Security is used in standalone mode and you are using KSN in the application, you can enable cloud mode. Cloud mode is an operating mode of Kaspersky Endpoint Security that uses a lightweight version of the malware databases. This lets you reduce the load on device memory.

Kaspersky Security Network facilitates the application's use of the lightweight malware databases.

If you plan to use cloud mode, make sure KSN is available on your device. Kaspersky Security Center displays information about the availability of KSN via the client device status (OK, Critical, Warning) in the list of managed devices on the Devices tab.

Kaspersky Endpoint Security switches to using a lightweight version of the malware databases after enabling cloud mode and performing the latest update of the application databases and modules. If you are not using KSN or cloud mode is disabled, Kaspersky Endpoint Security downloads the full version of the application databases from Kaspersky servers during the next update of application databases and modules.

Cloud mode is disabled automatically if use of KSN is disabled.

If Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments, use of the lightweight malware databases is not supported. Kaspersky Endpoint Security receives special databases necessary for the operation of the Light Agent from the Protection Server.

Using the KSN Proxy service

User devices managed by Kaspersky Security Center Administration Server can interact with KSN via the KSN Proxy service.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KSN Proxy service facilitates interaction with the KSN infrastructure. If the KSN proxy is not available, KSN is not used by the application.

You can configure the KSN proxy server settings in the Kaspersky Security Center Administration Server properties. For details about the KSN proxy server, refer to the Kaspersky Security Center Help.

Kaspersky Security Network settings

Setting

Description

Do not use KSN

By selecting this option, you decline to use Kaspersky Security Network.

Extended KSN mode

By selecting this option, you accept the terms of using Kaspersky Security Network. You will be able to receive information from Kaspersky's online knowledge base about the reputation of files, web resources, and software. Also, anonymous statistics and information about the types and sources of various threats will be sent to Kaspersky to improve Kaspersky Security Network.

Basic KSN mode

By selecting this option, you accept the terms of using Kaspersky Security Network. You will be able to receive information from Kaspersky online knowledge base about the reputation of files, web resources, and software.

Enable cloud mode

The check box enables or disables the operating mode in which Kaspersky Endpoint Security uses a lightweight version of the malware databases.

The check box is available if use of KSN is enabled.

The check box is selected if, when creating a policy, you accepted the terms of the Kaspersky Security Network Statement and are using KSN in extended mode.

The mode is enabled or disabled after the next application database update.

This setting applies only if the application is used in standalone mode.

Use KSN servers when KSN Proxy is not available

The check box enables or disables the ability to communicate with KSN servers directly when the KSN Proxy service is unavailable.

The check box is selected by default.

This setting applies only if the application is used in standalone mode.

Kaspersky Security Network Statement

This link opens the Kaspersky Security Network Statement window, where you can read the text of the Kaspersky Security Network Statement.

Page top

[Topic 246797]

Kaspersky Security Network Statement

In this window, you can read the text of the Kaspersky Security Network Statement and accept its terms and conditions.

Kaspersky Security Network settings

Setting

Description

I confirm that I have fully read, understand, and accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you want to use the Kaspersky Security Network, and you have fully read, understood, and accept the terms and conditions of the Kaspersky Security Network Statement that is displayed.

I do not accept the terms and conditions of the Kaspersky Security Network Statement

By selecting this option, you confirm that you do not want to use Kaspersky Security Network.

Page top

[Topic 202351]

Anti-Cryptor

Anti-Cryptor allows you to protect your files in local directories with network access by SMB/NFS protocols from remote malicious encryption.

While the Anti-Cryptor component is running, Kaspersky Endpoint Security scans remote devices calls to access the files located in the shared network directories of the protected device. If the application considers a remote device actions on network file resources to be malicious encrypting, this device is added to a list of untrusted devices and loses access to the shared network directories. The application does not consider activity to be malicious encryption if it is detected in the directories excluded from the protection scope of the Anti-Cryptor component.

This feature is not supported in the KESL container.

To use the component, a license that includes the corresponding function is required.

For the Anti-Cryptor component to operate correctly, at least one of the services (Samba or NFS) must be installed in the operating system. For the NFS service, the rpcbind package must be installed.

Anti-Cryptor operates correctly with the SMB1, SMB2, SMB3, NFS3, TCP/UDP, and IP/IPv6 protocols. Working with NFS2 and NFS4 protocols is not supported. It is recommended to configure your server settings so that the NFS2 and NFS4 protocols cannot be used to mount resources.

Anti-Cryptor does not block access to network file resources until the device activity is identified as malicious. So, at least one file will be encrypted before the application detects malicious activity.

Anti-Cryptor settings

Setting

Description

Anti-Cryptor protection enabled / disabled

This toggle button enables or disables protection of files in the local directories with network access by SMB/NFS protocols from remote malicious encryption.

The toggle button is switched off by default.

Protection scopes

Clicking the Configure protection scope link opens the Protection scopes window.

Untrusted hosts blocking enabled / disabled

This toggle button enables or disables untrusted hosts blocking.

The check toggle button is switched on by default.

Block untrusted host for (min)

In this field you can specify the untrusted device blocking duration in minutes. After the specified time, Kaspersky Endpoint Security removes the untrusted devices from the list of blocked devices. The access of the host to network file resources is restored automatically, after it is deleted from the list of untrusted hosts.

If a compromised host is blocked and you change this setting value, the blocking time for this host will not change. The blocking time is not a dynamic value, and it is calculated at the moment of blocking.

Available values: integer from 1 to 4294967295.

Default value: 30.

Exclusions

Clicking the Configure exclusions link opens the Exclusion scopes window.

Exclusions by mask

Clicking the Configure exclusions by mask link opens the Exclusions by mask window.

Page top

[Topic 202352]

Protection scopes window

The table contains protection scopes of the Anti-Cryptor component. The application will scan files and directories located in the paths specified in the table. By default, the table contains one scan scope that includes all directories of the local file system.

Protection scope settings

Setting

Description

Scope name

Protection scope name.

Path

Path to the directory that the application protects.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security protects objects in the specified scopes in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 202353]

Add protection scope window

In this window, you can add or configure protection scope for the Anti-Cryptor component.

Protection scope settings

Setting

Description

Scope name

Field for entering the protection scope name. This name will be displayed in the table in the Protection scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this protection scope during the component operation.

If this check box is cleared, the application does not process this protection scope during the component operation. You can later include this scope in the component operation settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

You can select the type of file system in the drop-down list:

  • Local (default value) – local directories.
  • Shared displays server file system resources accessible via the Samba or NFS protocol.
  • All shared displays all server file system resources accessible via the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.

This drop-down list is available if the Shared option is selected in the drop-down list of file systems.

Path

The entry field for specifying the path to the directory that you want to include in the protection scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

This field is available if the Local type is selected in the drop-down list of file systems.

The field must not be blank.

By default, the / path is specified (root directory).

Masks

This list contains name masks of the objects that the application scans during operation of the Anti-Cryptor component.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 210496_3]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 248957_1]

Add exclusion scope window

In this window, you can add and configure exclusion scopes.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables the exclusion of the scope when the application is running.

If the check box is selected, the application excludes this scope from scan or protection during its operation.

If the check box is cleared, the application includes this scope in scan or protection during its operation. You can later exclude this scope from scan or protection by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

In this drop-down list, you can select the type of file system where the directories that you want to add to scan exclusions are located:

  • Local, for local directories.
  • Mounted, for remote directories mounted on the device.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Mounted type is selected in the drop-down list of file systems.

Path

Entry field for the path to the directory that you want to add to the exclusion scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default. The application excludes all directories of the local file system from scan.

This field is available if the Local type is selected in the drop-down list of file systems.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the exclusion scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks of the objects that the application excludes from scan. Masks are only applied to objects in the directory specified in the Path field.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

 

Page top

[Topic 202356_1]

Exclusions by mask window

You can configure the exclusion of objects from scans based on name mask. The application will not scan files whose names contain the specified mask. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected name mask of files excluded from a scan.

This button is available if at least one file mask is selected in the list.

Clicking the mask opens the Object mask window. In this window, in the Define object mask field, you can modify the name template for files that Kaspersky Endpoint Security excludes from scans.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 202363]

System Integrity Monitoring

System Integrity Monitoring is designed to track the actions performed on files and directories in the monitoring scope specified in the component operation settings. You can use System Integrity Monitoring to track the file changes that may indicate a security breach on a protected device.

To use the component, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

System Integrity Monitoring settings

Setting

Description

System Integrity Monitoring enabled / disabled

This toggle button enables or disables System Integrity Monitoring.

The toggle button is switched off by default.

Monitoring scopes

Clicking the Configure monitoring scopes link opens the Monitoring scopes window.

Monitoring exclusions

Clicking the Configure monitoring exclusion scopes link opens the Exclusion scopes window.

Exclusions by mask

Clicking the Configure exclusions by mask link opens the Exclusions by mask window.

Page top

[Topic 202280]

Monitoring scopes window

The table contains monitoring scopes for the System Integrity Monitoring component. The application monitors files and directories located in the paths specified in the table. By default, the table contains the Kaspersky internal objects (/opt/kaspersky/kesl/) monitoring scope.

Monitoring scope settings for System Integrity Monitoring

Setting

Description

Scope name

Monitoring scope name.

Path

Path to the directory that the application protects.

Status

The status indicates whether the application scans this scope.

You can add, edit, delete, move up, and move down items in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Kaspersky Endpoint Security scans objects in the specified scopes, in the order they appear in the list of scopes. If necessary, place the subdirectory higher in the list than its parent directory, to configure security settings for a subdirectory that are different from the security settings of the parent directory.

Page top

[Topic 218554]

Add monitoring scope window

In this window, you can add and configure monitoring scope for the System Integrity Monitoring component.

Monitoring scope settings

Setting

Description

Scope name

Field for entering the monitoring scope name. This name will be displayed in the table in the Monitoring scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application controls this monitoring scope during the operation.

If this check box is cleared, the application does not control this monitoring scope during the operation. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the monitoring scope. You can use masks to specify the path. The field must not be blank.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202410_1]

Exclusion scopes window

The table contains monitoring exclusion scopes for the System Integrity Monitoring component. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from monitoring.

Status

Indicates whether the application excludes this scope from monitoring during the component operation.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 219604]

Add exclusion scope window

In this window, you can add or configure the monitoring exclusion scope for the System Integrity Monitoring component.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window. The entry field must not be blank.

Use this scope

The check box enables or disables the exclusion of the scope from monitoring when the application is running.

If this check box is selected, the application excludes this scope from monitoring during the component operation.

If this check box is cleared, the application monitors this scope during the component operation. You can later exclude this scope from monitoring by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to add to the exclusion scope. You can use masks to specify the path. The field must not be blank.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Masks

The list contains name masks of the objects that the application excludes from the monitoring.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202412_2]

Exclusions by mask window

You can configure the exclusion of objects from monitoring based on name masks. The application does not scan the files with the names containing the specified masks. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 246368]

Application Control

During execution of the Application Control task, Kaspersky Endpoint Security controls the launching of applications on user devices. This helps reduce the risk of device infection by restricting access to applications. Application launching is regulated by Application Control rules.

To use the component, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

Application Control can operate in two modes:

  • Denylist. In this mode Kaspersky Endpoint Security allows all users to launch any applications that are not specified in the Application Control rules. This is the default operation mode of the Application Control component.
  • Allowlist. In this mode Kaspersky Endpoint Security prevents all users from launching any applications that are not specified in the Application Control rules.

For each Application Control mode, separate rules can be created and an action can be specified: apply rules or notify about an attempt to start an application that matches the rules. Kaspersky Endpoint Security performs this action when it detects an attempt to start an application.

The Application Control settings are described in the following table.

Application Control settings

Setting

Description

Application Control enabled / disabled

This toggle button enables or disables Application Control.

The toggle button is switched off by default.

Action on starting applications blocked by rules

The action that Kaspersky Endpoint Security performs upon detecting an attempt to start an application that matches the configured rules:

  • Inform (test mode). If you select this option, Kaspersky Endpoint Security tests the rules and generates an event about an attempt to start an application that matches the rules.
  • Apply rules (default value). If you select this option, Kaspersky Endpoint Security applies Application Control rules and performs the action specified in the rules.

Application Control mode

Application Control task operation mode:

  • Allowlist. If you select this option, Kaspersky Endpoint Security prevents all users from launching any applications except those specified in the Application Control rules.
  • Denylist (default value). If you select this option, Kaspersky Endpoint Security allows all users to launch any applications except those specified in the Application Control rules.

Application Control rules

Clicking the Configure rules link opens the Application Control rules window.

Page top

[Topic 246370]

Application Control rules window

The Application Control rules table has the tabs with the rules for each operation mode: Denylist (active) and Allowlist. Both tabs of the Application Control rules table are empty by default.

Application Control rules settings

Setting

Description

Category

The name of the application category that is used by the rule.

Status

Operation status of the Application Control rule:

  • Enabled – the rule is enabled, Application Control applies this rule during operation.
  • Disabled – the rule is disabled and is not used when the Application Control is running.
  • Test – Application Control allows launching applications that meet the rule criteria, but logs information about launches of these applications in the report.

You can add, modify and remove Application Control rules.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Page top

[Topic 246371]

Application Control rule window

In this window, you can configure the settings for the Application Control rule.

Configuring an Application Control rule

Setting

Description

Rule description

Description of the Application Control rule.

Status

You can select the operation status of the Application Control rule:

  • Enabled – the rule is enabled, Application Control applies this rule during operation.
  • Disabled – the rule is disabled and is not used when the Application Control is running.
  • Test – Application Control allows launching applications that meet the rule criteria, but logs information about launches of these applications in the report.

Category

The Choose category link opens the Application categories window.

Users and their rights

The table contains a list of users or user groups to which the Application Control rule applies, and the types of access assigned to them, and consists of the following columns:

  • User or group name – names of users or names of user groups to which the Application Control rule applies.
  • Access – access type (allow or block launching applications). This toggle button switches access type: Allow launching the applications or Block launching the applications.

     

You can add, edit, and delete users or user groups.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 246372]

Application categories window

In this window, you can add a new category or configure the category settings for an Application Control rule.

Kaspersky Endpoint Security does not support use of the KL categories of Kaspersky Security Center.

Application Control categories

Setting

Description

Category name

Search bar for added application categories.

Add

Clicking the button starts the category creation wizard. Follow the instructions of the Wizard.

For details about creating a category, refer to the Kaspersky Security Center Help.

Edit

Clicking this button opens the category properties window, where you can change the category settings. The Golden Image (local) category cannot be edited.

Remove

Clicking the button deletes the selected category. The Golden Image (local) category cannot be deleted.

Page top

[Topic 247145]

Select user or group window

In this window, you can specify a local or domain user or user group for which you want to configure a rule.

Configuring an Application Control rule

Setting

Description

Manually

If this option is selected, in the field below enter the name of the local or domain user or the name of a user group, to which the Application Control rule will apply.

List of groups or users

If this option is selected, in the search field you can enter search criteria for the name of the user or name of the user group, to which the Application Control rule will apply, or you can select the name of the user group in the list below.

Page top

[Topic 197568]

Device Control

When the Device Control task is running, Kaspersky Endpoint Security manages user access to the devices that are installed on or connected to the client device (for example, hard drives, cameras, or Wi-Fi modules). This lets you protect the client device from infection when external devices are connected, and prevent data loss or leaks. Device Control manages user access to devices using the access rules.

This feature is not supported in the KESL container.

When a device, access to which is denied by the Device Control task, connects to a client device, the application denies the users specified in the rule access to this device and displays a notification. During attempts to read and write on this device, the application silently blocks the users specified in the rule from reading/writing.

Device Control settings

Setting

Description

Device Control enabled / disabled

This toggle button enables or disables Device Control.

The check toggle button is switched on by default.

Configure trusted devices

Clicking this link opens the Trusted devices window. In this window, you can add devices to a list of trusted devices by ID or by selecting them from the list of devices detected on the client devices.

Device Control action

Action performed by the application when an attempt is made to access a device to which access is denied in accordance with Device Control rules.

  • Test rules. If you select this option, Kaspersky Endpoint Security tests the access rules and generates an event about detection of an attempt to access a device.
  • Apply rules (default value). If you select this option, Kaspersky Endpoint Security applies Access Control rules and performs the action specified in the rules.

Configure settings for device types

Clicking this link opens the Device types window. In this window, you can configure access rules for various types of devices.

Configure settings for connection buses

Clicking this link opens the Connection buses window. In this window, you can configure access rules for connection buses.

Page top

[Topic 246343]

Trusted devices window

The table contains a list of trusted devices. The table is empty by default.

Trusted device settings

Setting

Description

Device ID

ID of a trusted device.

Device name

Name of a trusted device.

Device type

Trusted device type (for example, Hard drive or Smart card reader).

Host name

Name of the client device the trusted device is connected to.

Comment

Comment related to a trusted device.

You can add a device to the list of trusted devices by the device ID or by selecting the required device in the list of devices detected on the user device.

You can edit and delete trusted devices in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

You can also import the list of devices from a file by clicking Import and export the list of added devices to a file by clicking Export. When importing, you will be prompted to replace the list of trusted devices or add the devices to the existing list.

Page top

[Topic 246347]

Trusted device (Device ID) window

In this window, you can add a device to the list of trusted devices by its identifier.

Adding device by ID

Setting

Description

Device ID

Entry field for a device ID or device ID mask. You can manually specify the device ID or copy the ID of the required device from the Devices detected on hosts list.

To specify an identifier, you can use the following wildcards: * (any sequence of characters) or ? (any single character). For example, you can specify the USBSTOR* mask to allow access to all USB drives.

Comment

Entry field for a comment (optional). This field is available after you enter the device ID, and click the Next button.

Page top

[Topic 246348]

Trusted device window (List of detected devices)

In this window you can add a device to the list of trusted devices by selecting it in the list of existing managed devices.

Information about existing devices is available only if an active policy exists and synchronization with the Network Agent has been completed (the synchronization interval is specified in the Network Agent policy properties; the default setting is 15 minutes). If you create a new policy and there are no other active ones, the list will be empty.

Adding device from list

Setting

Description

Device type

In this drop-down list, you can select type of devices to be displayed in the Devices detected on hosts table.

Device ID mask

Entry field for a device ID mask.

Comment

Entry field for a comment (optional). This field is available after you select the devices, and click the Next button.

Clicking the Filter button opens the window, where you can set up the filtering of displayed information about devices.

Page top

[Topic 238846]

Device types window

In this window, you can configure access rules for various types of devices.

Access rules for device types

Setting

Description

Access to data storage devices

The table contains the following columns:

  • Type represents device types (for example, Hard drives, Printers).
  • Access represents the access mode for devices of this type. You can select one of the following access modes:
    • Allow, to allow access to devices of this type.
    • Block, to block access to devices of this type.
    • Depends on bus (default value), to allow or block access to devices depending on the access rule for a bus used for connecting a device.
    • By rule – allow or block access to devices, depending on the access rule and schedule. You can configure the access rule and its schedule by clicking the required device type.

Access to other devices

The table contains the following columns:

  • Type – type of device (for example, Input devices, Sound adapters).
  • Access represents the access mode for devices of this type. You can select one of the following access modes:
    • Allow, to allow access to devices of this type.
    • Block, to block access to devices of this type. The Block access rule cannot be selected for network adapters.
    • Depends on bus (default value), to allow or block access to devices depending on the access rule for a bus used for connecting a device.

Page top

[Topic 247147]

Device access rules window

In this window, you can configure access rules and schedules for the selected device type.

Device access rules and schedules

Setting

Description

Access to device

Access mode for devices of the selected type:

  • Allow: allow access to devices of the selected type.
  • Block: prohibit access to devices of the selected type.
  • Depends on bus (default value), to allow or block access to devices depending on the access rule for a bus used for connecting a device.
  • By rule – allow or block access to devices, depending on the access rule and schedule.

List of device access rules

The table contains a list of access rules and consists of the following columns:

  • Access schedule – names of existing access schedules.
  • Users and/or user groups – names of users or names of user groups, to which the access rule will apply.
  • Access – access mode for the schedule:
    • Allow (provides access to devices of the selected type).
    • Block (prohibits access to devices of the selected type).
  • Status – status of the access rule:
    • Enabled – the rule is enabled; Application Control applies this rule when it runs.
    • Disabled – the rule is disabled and is not used when Application Control is running.

By default, the table contains the Default schedule access schedule, which provides all users with full access to devices (the \Everyone option is selected in the list of users and groups) at any time, if access by the connection bus is allowed for this type of device.

You can add, edit, and delete access rules.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 247148]

Device access rules window

In this window, you can configure the device access rule.

Device access rule

Setting

Description

Device access rule settings

Access mode for devices of the selected type:

  • Allow (default value) – provide access to the devices of the selected type.
  • Block: prohibit access to devices of the selected type.

Users and/or user groups

Name of the user or user group to which the rule applies.

The default value is \All (all users).

You can add, edit, and delete users or user groups.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Status

Access rule status:

  • Enabled – the rule is enabled; Application Control applies this rule when it runs.
  • Disabled – the rule is disabled and is not used when Application Control is running.

Schedule for access to devices

Schedule for the specified users' access to devices. The default value is Default schedule. You can set a different schedule.

Page top

[Topic 247150]

Select user or group window

In this window, you can specify a local or domain user or user group for which you want to configure an access rule.

Configuring an access rule

Setting

Description

Manually

If this option is selected, in the field below enter the name of the local or domain users or the name of a user group, to which the device access rule will apply.

List of groups or users

If this option is selected, in the search field you can enter search criteria for the name of the user or name of the user group, to which the device access control rule will apply, or you can select the name of the user group in the list below.

Page top

[Topic 202423]

Schedules window

In this window, you can specify the schedule for the selected device access rule.

You can add, edit, and delete access schedule.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

You cannot delete the Default schedule.

Page top

[Topic 264655]

Schedule for access to devices window

In this window, you can configure the device access schedule. You can configure schedules only for hard drives, removable drives, floppy disks, and CD/DVD drives.

In the General settings -> Application settings section, if the Block access to files during scanning check box is cleared, then it is not possible to block access to devices using a device access schedule.

Schedule for access to devices

Setting

Description

Name

Entry field for the access schedule name. The schedule name must be unique.

Time intervals

The table where you can select time intervals for the schedule (days and hours).

Intervals highlighted in green are included to the schedule.

To exclude an interval from the schedule, click the corresponding cells. Intervals excluded from the schedule are highlighted in gray.

By default, all intervals (24/7) are included to the schedule.

Page top

[Topic 202425]

Connection buses window

In this window, you can configure access rules for connection buses.

Connection rules for buses

Setting

Description

Connection bus

Connection bus used to connect devices to the client device:

  • FireWire
  • USB

Access

This toggle button enables or disables access to devices that use this connection bus:

  • Allow (default value), to provide access to the devices connected using this connection bus.
  • Block, to deny access to the devices connected using this connection bus.

Page top

[Topic 237048]

Behavior Detection

By default, the Behavior Detection component starts when Kaspersky Endpoint Security starts and monitors the malicious activity of the applications in the operating system. When malicious activity is detected, Kaspersky Endpoint Security can terminate the process of the application that performs malicious activity.

This feature is not supported in the KESL container.

Behavior Detection component settings

Setting

Description

Behavior Detection enabled / disabled

This toggle button enables or disables the Behavior Detection component.

The check toggle button is switched on by default.

Action on malware activity detection

The action to be performed by Kaspersky Endpoint Security upon detecting malicious activity in the operating system:

  • Inform user. Kaspersky Endpoint Security does not terminate the process that performs malicious activity; it only records the detection of malicious activity in the event log.
  • Block the application that performs malicious activity (default value). Kaspersky Endpoint Security terminates the process that performs malicious activity and logs information about the detected malicious activity.

Exclusions by process

Clicking the Configure exclusions by process link opens the Exclusions by process window. In this window, you can exclude the activity of processes.

Page top

[Topic 197235]

Exclusions by process window

The table contains the exclusion scopes for exclusion by process The exclusion scope for exclusion by process lets you exclude the activity of the indicated process and files modified by the indicated process. By default, the table is empty.

If integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response is enabled, exclusions by process are not applied.

Exclusion scope settings for exclusion by process

Setting

Description

Exclude / Do not exclude trusted processes from scans

The switch enables or disables the configured exclusions by process in the operation of the Behavior Detection component.

The toggle button is switched off by default.

Exclusion scope name

Exclusion scope name.

Path

Full path to excluded process.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

You can also import the list of exclusions from a file by clicking Import and export the list of added exclusions to a file by clicking Export. When importing, you will be prompted to replace the list of exclusions or add the exclusions to the existing list.

Page top

[Topic 237043]

Adding a process exclusion scope window

In this window, you can add and configure exclusion scopes for exclusion by process.

Exclusion scope settings

Setting

Description

Process-based exclusion scope name

Field for entering the Process-based exclusion scope name. This name will be displayed in a table in the Exclusions by process window.

The entry field must not be blank.

Use this exclusion

This check box enables or disables this scan scope exclusion when the application is running.

The check box is selected by default.

Path to excluded process

Full path to the process you want to exclude from scans. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The entry field must not be blank.

Apply to child processes

Exclude child processes of the excluded process indicated by the Path to excluded process setting.

This check box is cleared by default.

Page top

[Topic 233441]

Managing tasks

You can configure the ability to view and manage Kaspersky Endpoint Security tasks on managed devices.

Task management settings

Setting

Description

Allow users to view and manage local tasks

This check box allows or blocks the users from viewing local tasks created in Kaspersky Endpoint Security and control of these tasks on the managed client devices.

This check box is cleared by default.

Allow users to view and manage tasks created through KSC

The check box allows or prohibits the users from viewing tasks created in Kaspersky Security Center Web Console and managing these tasks on managed client devices.

This check box is cleared by default.

Page top

[Topic 247217]

Removable Drives Scan

When the Removable Drives Scan task is running, the application scans the removable device and its boot sectors for viruses and other malware. The following removable drives are scanned: CDs, DVDs, Blu-ray discs, flash drives (including USB modems), external hard drives, and floppy disks.

This feature is not supported in the KESL container.

Removable Drives Scan task settings

Setting

Description

Removable drives scan enabled / disabled

This option enables or disables the scan of removable drives when they are connected to the user device.

The toggle button is switched off by default.

Action when a removable drive connects

In the drop-down list, you can select an action to be performed by the application upon connection of removable drives to the user device:

  • Do not scan removable drives when connected (default value).
  • Quick scan – only scan files of certain types on removable drives (except CD/DVD drives and Blu-ray discs) and do not unpack compound objects. For the quick scan, the default settings of the File Threat Protection component are used.
  • Detailed scan – scan all files on removable drives (except CD/DVD drives and Blu-ray discs). For a detailed scan, the default settings of the Malware Scan task are used.

Action on a CD / DVD drive connection

In the drop-down list, you can select an action to be performed by the application upon connection of CD/DVD drives and Blu-ray discs to the user device:

  • Do not scan CD/DVD drives and Blu-ray discs when connected (default value).
  • Quick scan – only scan files of certain types on CD/DVD drives and Blu-ray discs. For the quick scan, the default settings of the File Threat Protection component are used.
  • Detailed scan – scan all files on CD/DVD drives and Blu-ray discs. For a detailed scan, the default settings of the Malware Scan task are used.

Block access to the removable drive while scanning

This check box enables or disables blocking of files on the connected drive during execution of the Removable Drives Scan task.

This check box is cleared by default.

Page top

[Topic 197958]

Proxy server settings

You can configure proxy server settings if the users of the client devices use a proxy server to connect to the internet. Kaspersky Endpoint Security may use a proxy server to connect to Kaspersky servers, for example, when updating application databases and modules or when communicating with Kaspersky Security Network and Kaspersky Endpoint Detection and Response (KATA).

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of a proxy server for connecting to Kaspersky Security Network, the SVM, and the Integration Server is not supported.

Proxy server settings

Setting

Description

Do not use proxy server

If this option is selected, Kaspersky Endpoint Security does not use a proxy server.

Use specified proxy server settings

If this option is selected, Kaspersky Endpoint Security uses the specified proxy server settings, for example, for integration with Kaspersky Endpoint Detection and Response (KATA).

Address

Field for entering the proxy server's IP address or domain name.

This field is available if the Use specified proxy server settings option is selected.

Port

Field for entering the proxy server's port.

Default value: 3128.

This field is available if the Use specified proxy server settings option is selected.

Use user name and password

Enables or disables proxy server authentication using a user name and password.

This check box is available if the Use specified proxy server settings option is selected.

This check box is cleared by default.

When connecting via an HTTP proxy, we recommend to use a separate account that is not used to sign in to other systems. An HTTP proxy uses an insecure connection, and the account may be compromised.

User name

Entry field for the user name used for proxy server authentication.

This entry field is available if the Use user name and password check box is selected.

Edit

Allows you to specify a password for authenticating on the proxy server. The Password field cannot be edited. By default, the password is empty.

To specify a password, click Edit. In the window that opens, enter the password and click OK.

It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

Clicking the Show button in the window displays the password in clear text in the password entry window.

This button is available if the Use user name and password check box is selected.

Use Kaspersky Security Center as a proxy server for the application activation

This check box enables or disables use of Kaspersky Security Center as a proxy server for application activation.

If this check box is selected, Kaspersky Endpoint Security uses Kaspersky Security Center as a proxy server for the application activation.

This check box is cleared by default.

This setting applies only if the application is used in standalone mode. If the application is used in Light Agent mode to protect virtual environments, the license information is provided by the Protection Server.

Page top

[Topic 246285]

Application settings

You can configure the general settings of Kaspersky Endpoint Security.

General application settings

Setting

Description

Detect legitimate applications that may be used by hackers to harm devices or data

This check box enables or disables the detection of legitimate software that could be used by hackers to harm computers or data of users.

This check box is cleared by default.

Event notifications

Clicking the Configure event notifications link opens the Notification settings window. In this window, you can select the events that the application logs in the operating system log (syslog). To do this, select the check box next to each type of event that you want to log.

You can also select the check box next to the event severity level (Functional failures, Informational messages, Warnings, Critical events). In this case, the check boxes will be automatically selected next to each type of event that belongs to the group of the selected importance level.

All check boxes are cleared by default.

Block access to files during scans

The checkbox enables or disables blocking access to files during scanning by the File Threat Protection, Anti-Cryptor, Device Control components and the Removable Drives Scan task.

If the check box is cleared, the Notify only mode is enabled for the File Threat Protection and Device Control components.

The check box is selected by default.

Excluding process memory from scan

The Configure excluding process memory from scan link opens the Excluding process memory from scan window where you can create a list of processes to exclude during process memory scans.

Limit CPU utilization for scan tasks (%)

The checkbox enables or disables the CPU utilization limit for the Malware Scan, Inventory, Container Scan, and Custom Container Scan tasks.

This check box is cleared by default.

Maximum load (as a percentage)

A field for entering the maximum load on all processor cores (as a percentage) when running the Malware Scan, Inventory Scan, Container Scan, and Custom Container Scan tasks.

Available values: 10–100.

The default value is 100%

The field is available if the Limit CPU utilization for scan tasks checkbox is selected.

Advanced application settings

The Configure dump file settings link opens the Dump file settings window.

Page top

[Topic 236898_1]

Excluding process memory from scan window

The list contains paths to processes whose memory Kaspersky Endpoint Security excludes from process memory scans. You can use masks to specify the path. By default, the list is empty.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

You can add, edit, and delete items in the list.

Clicking the Delete button causes Kaspersky Endpoint Security to remove the selected process path from the list.

This button is available if at least one process path is selected in the list.

The Edit button a window where you can change the process path. Kaspersky Endpoint Security excludes the memory of the indicated process from scans.

The Add button opens a window where you can enter the full path to a process. Kaspersky Endpoint Security excludes the memory of the indicated process from scans.

Page top

[Topic 261204]

Dump file settings window

In this window, you can configure the settings for writing dump files.

Dump file settings

Setting

Description

Create a dump file if the application crashes

This check box enables or disables the creation of a dump file when the application crashes.

This check box is cleared by default.

You must restart the application to apply the dump file settings.

Path to the dump file directory

Input field for the path to the directory where the dump files are stored. The input field is limited to 128 characters.

Default value: /var/opt/kaspersky/kesl/common/dumps.

Page top

[Topic 207662]

Container scan settings

You can configure the settings for namespace and container scan by Kaspersky Endpoint Security.

The application does not scan namespaces and containers unless components for working with containers and namespaces are installed in the operating system. Moreover, in the device properties in the Applications section, in the application properties in the Components section for container scans, the Stopped status is displayed.

Container scan settings

Setting

Description

Namespace and container scan enabled / disabled

This toggle button enables or disables namespace and container scans.

The check toggle button is switched on by default.

Action with container upon threat detection

You can select the action that the application performs on a container when it detects an infected object:

  • Skip container: if an infected object is detected, the application does not perform any action on the container.
  • Stop container: if an infected object is detected, the application stops the container.
  • Stop container if disinfection fails (default value) – the application stops the container if disinfection of the infected object fails.

This setting is available when using the application under a license that supports this function.

Use Docker

This check box enables or disables the use of the Docker environment.

The check box is selected by default.

Docker socket path

Entry field for the path or URI (Uniform Resource Identifier) of the Docker socket.

Default value: /var/run/docker.sock.

Use CRI-O

The check box enables or disables the use of the CRI-O environment.

The check box is selected by default.

File path

Entry field for the path to CRI-O configuration file.

Default value: /etc/crio/crio.conf.

Use Podman

The check box enables or disables the use of the Podman utility.

The check box is selected by default.

File path

Entry field for the path to the Podman utility executable file.

Default value: /usr/bin/podman.

Root directory

Entry field for the path to the root directory of the container storage.

Default value: /var/lib/containers/storage.

Use runc

The check box enables or disables the use of the runc utility.

The check box is selected by default.

File path

Entry field for the path to the runc utility executable file.

Default value: /usr/bin/runc.

Root directory

Entry field for the path to the root directory of the container state storage.

Default value: /run/runc.

Page top

[Topic 202314]

Managed Detection and Response

Integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response enables continuous search, detection and elimination of threats aimed at your organization.

When interacting with Kaspersky Managed Detection and Response, Kaspersky Endpoint Security allows you to perform the following actions:

  • Send telemetry data to Kaspersky Managed Detection and Response for threat detection.
  • Carry out Kaspersky Managed Detection and Response commands for providing security features.

    Managed Detection and Response settings

    Setting

    Description

    Managed Detection and Response enabled / disabled

    This toggle button enables or disables integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response.

    The toggle button is switched off by default.

    Download

    Clicking this button opens a standard Microsoft Windows window, where you can select the BLOB configuration file.

Page top

[Topic 237096]

Network settings

You can configure the settings of encrypted connection scans. These settings are used by the Web Threat Protection component.

When the encrypted connection scan settings are changed, the application generates a Network settings changed event.

Network settings

Setting

Description

Encrypted connections scan enabled / disabled

This toggle button enables or disables scanning of encrypted connections.

The check toggle button is switched on by default.

Trusted certificates

The Configure list of trusted certificates link opens a window where you can configure a list of trusted certificates. Trusted certificates are used when scanning encrypted connections.

Action when an untrusted certificate is encountered

You can select the action that the application performs on a container when it detects an untrusted certificate:

  • Allow connection to a domain with an untrusted certificate (default value).
  • Block connection to a domain with an untrusted certificate.

Action on errors during an encrypted connections scan

You can select the action that the application performs when an error occurs during an encrypted connection scan:

  • Add website to exclusions (default value) – add the domain that resulted in the error to the list of domains with scan errors and do not scan encrypted network traffic when this domain is visited.
  • Disconnect from website – block the network connection.

Certificate verification policy

You can select how the application verifies certificates:

  • Local check: the application does not use the internet to validate a certificate.
  • Full check (default value): the application uses the Internet to check and download the missing chains that are required to validate a certificate.

Trusted domains

Clicking the Configure list of trusted domains link opens the Trusted domains window.

Network ports

Clicking the Configure network port settings link opens the Network ports window, where you can specify the network ports to be monitored by the application.

Monitor all network ports

If this option is selected, the application monitors all network ports.

Monitor specified ports only

If this option is selected, the application monitors only the network ports specified in the Network ports window.

This option is selected by default.

Page top

[Topic 7588]

Trusted certificates window

You can configure a list of certificates considered trusted by Kaspersky Endpoint Security. The list of trusted certificates is used when scanning encrypted connections.

The following information is displayed for each certificate:

  • certificate subject
  • serial number
  • certificate issuer
  • certificate start date
  • certificate expiration date
  • SHA-256 certificate thumbprint

By default, the certificate list is empty.

You can add and remove certificates.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

See also:

Adding a trusted certificate window

Trusted domains window

Network ports window

Page top

[Topic 197621]

Adding a trusted certificate window

In this window, you can add a certificate to the list of trusted certificates.

The Add certificate link opens the standard file selection window. Indicate the path to the file that contains the certificate, in DER or PEM format.

After the certificate file is selected, the window displays certificate information and the file path.

Page top

[Topic 238852]

Trusted domains window

This list contains the domain names and domain name masks that will be excluded from encrypted connection scans.

Example: *example.com. For example, *example.com/* is incorrect because a domain address, not a web page, needs to be specified.

By default, the list is empty.

You can add, edit and remove domains from the list of trusted domains.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202457]

Network ports window

This table contains the network ports monitored by the application if the Monitor specified ports only option is selected in the Network settings window.

The table contains two columns:

  • Port – monitored port.
  • Description – description of the monitored port.

By default, the table displays a list of network ports that are usually used for the transmission of mail and network traffic. The list of network ports is included in the application package.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202461]

Global exclusions

The table contains mount points that will be excluded from the scan scope for the application components that use the file operation interceptor (File Threat Protection and Anti-Cryptor).

The Path column displays the paths to the excluded mount points. The table is empty by default.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

Page top

[Topic 248961]

Adding a mount point exclusion window

Mount point settings

Setting

Description

File system, access protocol, and path

In this drop-down list, you can select the type of file system where the directories that you want to add to scan exclusions are located:

  • Local: local mount points.
  • Mounted: remote directories mounted on the device using the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Mounted type is selected in the drop-down list of file systems.

Path

Field for entering the path to the mount point that you want to exclude from file operation interception. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

To exclude the mount point /dir, you need to specifically indicate /dir (no asterisk).

The mask /dir/* excludes all mount points at the level below /dir but not /dir itself. The /dir/** mask excludes all mount points below the level of /dir but not /dir itself.

You can use a single ? character to represent any one character in the file or directory name.

This field is available if the Local type is selected in the drop-down list of file systems.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the file operation interception exclusions are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Page top

[Topic 202462]

Storage settings

The Storage is a list of backup copies of files that have been deleted or modified during the disinfection process. Backup copy is a file copy created at the first attempt to disinfect or delete this file. Backup copies of files are stored in a special format and do not pose a threat. By default, the Storage is located in the /var/opt/kaspersky/kesl/common/objects-backup/ directory. Files in the Storage may contain personal data. Root privileges are required to access files in the Storage.

Storage settings

Setting

Description

Informing about unprocessed files enabled / disabled

This toggle button enables or disables sending notifications about the files, that cannot be processed during the scan, to the Administration Server.

The check toggle button is switched on by default.

Informing about installed devices enabled / disabled

This toggle button enables or disables sending information about the devices installed on the managed client device to the Administration Server.

The check toggle button is switched on by default.

Informing about files in Storage enabled / disabled

This toggle button enables or disables sending of notifications about files in the Storage to the Administration Server.

The check toggle button is switched on by default.

Store objects no longer than (days)

The entry field to specify the period for storing objects in the Storage.

Available values: 0–3653.

Default value: 90. If 0 is specified, the period for storing objects in the Storage is unlimited.

Maximum size of Storage (MB)

The entry field to specify the maximum size of the Storage (MB).

Available values: 0–999999. Default value: 0 (the size of Storage is unlimited).

Page top

[Topic 246827]

Kaspersky Endpoint Detection and Response (KATA) Integration

Kaspersky Endpoint Detection and Response (KATA) is a component of the Kaspersky Anti Targeted Attack Platform solution, which is designed to protect the IT infrastructure of organizations and promptly detect threats, such as zero-day attacks, targeted attacks, and advanced persistent threats (APT). To read more, check out the Kaspersky Anti Targeted Attack Platform Help.

When interacting with Kaspersky Endpoint Detection and Response (KATA), Kaspersky Endpoint Security may send data about events on devices (telemetry) to the Kaspersky Anti Targeted Attack Platform server with the Central Node component ("KATA server") and execute commands from Kaspersky Anti Targeted Attack Platform intended to provide security.

This feature is not supported in the KESL container.

Management of integration settings with Kaspersky Endpoint Detection and Response (KATA) via Kaspersky Security Center Cloud Console is not supported.

For integration with Kaspersky Endpoint Detection and Response (KATA), the Behavior Detection component must be enabled.

The integration of Kaspersky Endpoint Security with Kaspersky Endpoint Detection and Response (KATA) is only possible if these components are enabled. Otherwise, the required telemetry data cannot be transmitted.

Kaspersky Endpoint Detection and Response (KATA) can additionally use data received from the following components:

  • File Threat Protection.
  • Network Threat Protection.
  • Web Threat Protection.

When integrated with Kaspersky Endpoint Detection and Response (KATA), devices with Kaspersky Endpoint Security establish secure connections to the KATA server via the HTTPS protocol. To ensure a secure connection, the following certificates issued by the KATA server are used:

  • KATA server certificate. The connection is encrypted using the server's TLS certificate. You can elevate the security of the connection by verifying the server certificate on the Kaspersky Endpoint Security side. You need to add the server certificate when configuring integration settings.
  • Client certificate. This certificate is used for additional protection of the connection using two-way authentication (scanning devices with Kaspersky Endpoint Security KATA server). The same client certificate can be used by multiple devices. By default, the KATA server does not validate client certificates, but validation can be enabled on the KATA server side. In this case, you need to enable two-way authentication and add the client certificate in the integration settings (cryptocontainer with certificate and private key).

Certificates for securing the connection to the KATA server are provided by the Kaspersky Anti Targeted Attack Platform administrator.

A proxy server is used to connect to the KATA server if use of a proxy server is configured in the general application settings of Kaspersky Endpoint Security.

Kaspersky Endpoint Detection and Response (KATA) integration settings

Setting

Description

Integration with Endpoint Detection and Response (KATA) enabled / disabled

Enables or disables the integration of the Kaspersky Endpoint Security application with Kaspersky Endpoint Detection and Response (KATA).

The integration is disabled by default.

Server connection settings

Clicking the Configure button in the block opens a window where you can configure general settings for connecting to KATA servers, add a server certificate, and configure two-way authentication when connecting to KATA servers.

KATA servers

The table contains a list of KATA servers to which connection is configured.

The Add button opens a window where you can configure the connection to the KATA server.

You can use the buttons above the table to edit and remove previously configured connection settings.

Maximum delay when sending events (sec)

The maximum delay in sending events to the KATA server in seconds.

The default value is 30.

Enable event throttling

Enables or disables the regulation of the number of events sent to the KATA server.

Maximum number of events per hour

Maximum number of events per hour

The default value is 3000.

Event throttle threshold (percentage)

Event throttle threshold (percentage). Sending events is limited if ratio of events of one type (for example, events about registry changes) to the total number of events exceeds the set threshold (as a percentage).

The default value is 15.

Page top

[Topic 246829]

Server connection settings window

In this window, you can configure general settings for connecting to KATA servers, add a server certificate, and configure two-way authentication when connecting to KATA servers.

KATA server connection settings

Setting

Description

Send a synchronization request to the KATA server every (minutes)

Frequency of sending synchronization requests to the KATA server in minutes.

The default value is 5.

Maximum time to wait for the server connection (sec)

Maximum time to wait for a connection to the KATA server in seconds.

The default value is 10.

Maximum time to wait for a response from the server (sec)

Maximum time to wait for a response from the KATA server in seconds.

The default value is 10.

Allow sending telemetry

Enables or disables sending data about events on devices (telemetry) to the KATA server.

Sending telemetry is enabled by default.

Server certificate

After adding the server certificate, information about the certificate is displayed:

  • certificate serial number
  • certificate subject
  • certificate issuer
  • certificate issue date
  • certificate expiration date

Select

Opens a standard file selection window where you can specify the path to the KATA server certificate.

If a server certificate has been added, the server certificate is verified on the Kaspersky Endpoint Security side. This elevates the security of the connection.

Remove

Deletes the server certificate added previously.

The button is displayed only if a server certificate has been added.

Additional connection protection

The settings section lets you enable or disable two-way authentication when connecting to the KATA server and add a client certificate.

Use two-way authentication

Enables or disables the use of two-way authentication to further secure the connection to the KATA server.

Two-way authentication must be enabled on the KATA server side.

To use two-way authentication, you need to add a client certificate.

Add a client certificate

Opens a standard file selection window where you can specify the path to the cryptocontainer (PFX archive) with the client certificate and private key.

The button is available if the Use two-way authentication check box is selected.

Edit

Allows you to specify the password for the cryptocontainer with the client certificate. The Cryptocontainer password field cannot be edited. By default, the password is empty.

To specify a password, click Edit. In the window that opens, enter the password and click OK. Clicking the Show button in the window displays the password in clear text in the password entry window.

It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

The button is available if the Use two-way authentication check box is selected.

Page top

[Topic 246830]

Server connection settings window

In this window you can specify the connection settings to the KATA server.

KATA server connection settings

Setting

Description

Address

KATA server address IP address (IPv4 or IPv6) or fully qualified domain name (FQDN) of the integration server can be specified.

To ensure that communication with the KATA server is not interrupted if the application fails when network isolation is enabled for the device, it is recommended to specify the server's IP address.

Default value: 127.0.0.1.

Port

Port to connect to the KATA server.

The default value is 443.

Page top

[Topic 246882]

Light Agent mode

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments.

Running Kaspersky Endpoint Security in Light Agent mode requires constant interaction between the Light Agent and the Protection Server installed on the SVM. If there is no connection to the Protection Server, the Light Agent cannot transfer file fragments to the Protection Server for scanning, and scanning is not performed.

To interact with the Protection Server, the Light Agent establishes and maintains a connection to the SVM on which this Protection Server is installed.

You can configure the following settings for connecting the Light Agent to the SVM:

  • SVM detection method. You can select the method that Light Agents use to discover SVMs available to connect to. The Light Agent can discover SVMs running on the network in one of the following ways:
    • Using the Integration Server. SVMs transmit information about themselves to the Integration Server. The Integration Server generates a list of SVMs available for connection and provides it to Light Agents.

      To use this method of detecting SVMs, you need to connect SVMs and Light Agents to the Integration Server.

    • Using a list of SVM addresses. You can specify a list of SVM addresses to which Light Agents can connect.
  • SVM selection algorithm for connecting. After receiving information about available SVMs, the Light Agent selects the optimal SVM to connect to in accordance with the SVM selection algorithm. You can specify which algorithm Light Agents should use when selecting an SVM to connect to.
  • Connection tags. You can use connection tags to control Light Agents' connection to SVMs. If you use connection tags, Light Agent can only connect to SVMs that are configured to use that connection tag.
  • Protection of the connection between the Light Agent and the Protection Server. You can use encryption to protect the connection between Light Agents and Protection Servers.

For more information about the settings for connecting the Light Agent to the SVM, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

In this section

SVM discovery settings

Integration Server connection settings

SVM connection tag

SVM selection algorithm

Protecting the connection

Page top

[Topic 261367]

SVM discovery settings

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments.

In this window, you can select the method that Light Agents use to discover SVMs available to connect to.

SVM discovery settings

Setting

Description

Use the Integration Server

If this option is selected, Light Agent connects to Integration Server to get a list of SVMs available for connection and their details.

If you want to use the Integration Server, you need to configure the settings for connecting Light Agents to the Integration Server.

Use a custom list of SVM addresses

If this option is selected, you can specify a list of SVMs that Light Agents managed by this policy can connect to. Light agents will only connect to SVMs specified in the list.

List of SVMs

A list of IP addresses in IPv4 format or fully qualified domain names (FQDNs) of the SVMs to which Light Agents managed by the policy can connect.

Click Add to open a window in which you can specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the SVM. You can enter multiple IP addresses or FQDNs of SVMs on a new line.

Specify only fully qualified domain names (FQDNs) that map to a single IP address. Using a fully qualified domain name that corresponds to multiple IP addresses can lead to errors in the application.

You can delete addresses selected in the list by clicking the Delete button.

The list of SVM addresses is displayed if the Use a custom list of SVM addresses option is selected.

If you select the Use a custom list of SVM addresses option, the Light Agent is using the extended SVM selection algorithm, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. In the SVM selection algorithm section, you need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

Page top

[Topic 261366]

Integration Server connection settings

The settings described in this section apply only if Kaspersky Endpoint Security is used in Light Agent mode for protecting virtual environments.

A connection to the Integration Server is required if you want Light Agents to receive information about the SVM through the Integration Server, or if you want to protect the connection between the Protection Server and the Light Agent.

This window displays the current settings for connecting Light Agents to the Integration Server: address and port for connecting. The Edit button opens the Connection to the Integration Server window, where you can configure the connection to the Integration Server.

Page top

[Topic 197257]

Connection to the Integration Server window

In this window, you can specify or change the settings for connecting Light Agents to the Integration Server.

Integration Server connection settings

Setting

Description

Address

IP address in IPv4 format or fully qualified domain name (FQDN) of the device on which the Integration Server is installed.

If a NetBIOS name, "localhost", or 127.0.0.1 is specified as the address, the connection to the Integration Server fails with an error.

Port

Port for connecting to the Integration Server.

Port 7271 is used by default.

Check

When you click the button, the web plug-in checks the SSL certificate received from the Integration Server.

The button is available after entering the address and port for connecting to the Integration Server.

If the certificate contains an error or is not trusted, a corresponding message is displayed in the Connection to the Integration Server window.

View the received certificate

Click the line to view information about the certificate received from the Integration Server.

Ignore

Select this option to save the received certificate and continue connecting to the Integration Server.

If you encounter problems with an SSL certificate, we recommend to make sure that the data transmission channel you are using is secure.

Cancel

Select this option to terminate the connection to the Integration Server.

Password

Password for the Integration Server administrator account (admin account password).

It is recommended to make sure that the password complexity and anti-bruteforce mechanisms ensure that the password cannot be guessed within 6 months.

Check

Clicking the button connects the web plug-in to the Integration Server.

After connecting to the Integration Server with administrator rights, the policy automatically receives the password of the agent account, which is used to connect Light Agents to the Integration Server. The password is stored in encrypted form.

Page top

[Topic 261368]

SVM connection tag

In this window, you can enable the Light Agent to use tags and assign a tag that the Light Agent will use to connect.

Make sure that the use of connection tags is also configured in the Protection Server settings: For more information, see the Help for Kaspersky Security for Virtualization Light Agent. Light Agents assigned a tag can only connect to SVMs that are allowed to connect to Light Agents with that tag.

Settings for using connection tags

Setting

Description

Use tags for connecting Light Agents

The check box enables or disables the use of SVM connection tags by the Light Agent.

Tag

A tag that is assigned to Light Agents.

You can enter a text string of up to 255 characters as a tag. You can use any character except the ; character.

This field is available if the Use tags for connecting Light Agents check box is selected.

Page top

[Topic 261369]

SVM selection algorithm

In this window, you can specify which SVM selection algorithm Light Agents for Linux should use, and configure the settings for using the extended SVM selection algorithm.

SVM selection algorithm

Setting

Description

Use the standard SVM selection algorithm

If this option is selected, after installing and running on a virtual machine, the Light Agent selects an SVM to connect to that is local to Light Agent. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

If there are no local SVMs available for connection, the Light Agent selects the SVM that has the fewest Light Agents connected, regardless of the location of the SVM in the virtual infrastructure.

This option is selected by default.

Use the extended SVM selection algorithm

If this option is selected, you can use the SVM path slider to specify how the SVM's location in the virtual infrastructure will be taken into account when determining whether the SVM is local relative to the Light Agent. The Light Agent will only be able to connect to SVMs that are local.

You can also specify that the SVM path in the virtual infrastructure should not be taken into account when selecting an SVM to connect to.

When selecting an SVM, Light Agents consider the number of Light Agents connected to the SVM to ensure an even distribution of Light Agents among the SVMs available to connect to.

SVM path

Allows you to specify the type of SVM path in the virtual infrastructure, which is taken into account when selecting SVMs for connection:

  • Hypervisor. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
    • The SVM is deployed on the same hypervisor as the virtual machine with the installed Light Agent (in a virtual infrastructure running on the Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Skala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server, or Astra Linux platform).
    • SVM is located in the same server group, as the virtual machine with the installed Light Agent (in virtual infrastructure running on TIONIX Cloud Platform or OpenStack platform).

    If there are no SVMs available for connection on the same hypervisor or in the same Server Group where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

  • Cluster. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
    • The SVM is deployed in the same hypervisor cluster as the virtual machine with the Light Agent installed (in a virtual infrastructure on Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Scala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server, or Astra Linux);
    • The SVM is deployed in the same OpenStack project as the virtual machine with the Light Agent installed (in a virtual infrastructure managed by the TIONIX Cloud Platform or the OpenStack platform).

    If there are no SVMs available for connection in the same hypervisor cluster or within the same OpenStack project where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

  • Data center. The Light Agent selects an SVM to connect to that meets the criteria (depending on the type of virtual infrastructure):
    • The SVM is deployed in the same data center as the virtual machine with the Light Agent installed (in a virtual infrastructure on Microsoft Hyper-V, Citrix Hypervisor, VMware vSphere, KVM, Proxmox VE, Scala-R, HUAWEI FusionSphere, Nutanix Acropolis, ALT Virtualization Server or Astra Linux).
    • The SVM is located in the same Availability Zone as the virtual machine with the Light Agent installed (in a virtual infrastructure managed by the TIONIX Cloud Platform or the OpenStack platform).

    If there are no SVMs available for connection in the same data center or Availability Zone where the virtual machine with the Light Agent is located, the Light Agent does not connect to the SVM.

  • Ignore SVM path. When selecting an SVM, the Light Agent does not consider its location.

The Hypervisor option is selected by default.

The option is available if the Use the extended SVM selection algorithm option is selected.

If a Light Agent uses the extended SVM selection algorithm and a list of SVM addresses is selected as the SVM discovery method, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. You need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

Page top

[Topic 261370]

Protecting the connection

In this window, you can enable encryption of the data transmission channel between the Light Agent and the Protection Server

Make sure that encryption of the data transmission channel between the Light Agent and the Protection Server is enabled in the Protection Server settings on the SVM. For more details, refer to the Help for Kaspersky Hybrid Cloud Security for Virtualization Light Agent.

Connection protection settings

Setting

Description

Encrypt data channel between Light Agent and the Protection Server

Use encryption to protect the connection between Light Agents and Protection Servers.

If the check box is selected, a secure connection is established between the Light Agent, which is managed by policy, and the Protection Server on the SVM that the Light Agent is connecting to. A Light Agent for which connection protection is enabled can only connect to an SVM on which connection protection is enabled or an unprotected connection to the Protection Server is allowed.

If the check box is cleared, an unprotected connection is established between the Light Agent and the Protection Server on the SVM that the Light Agent is connecting to.

This check box is cleared by default.

Page top

[Topic 208716]

Managing tasks in the Web Console

The tasks are executed only if Kaspersky Endpoint Security is running on the devices.

You can create the following tasks for managing Kaspersky Endpoint Security using the Web Console:

  • Local tasks that are configured for an individual device
  • Group tasks that are configured for devices within administration groups
  • Tasks for sets of devices that do not belong to administration groups

    The tasks for the sets of devices are performed only on the devices that are specified in the task settings. If new devices are added to the device selection for which the task is created, this task is not applied to the new devices. To apply the task to these computers, you must create a new task or edit the settings of the existing task.

You can create any number of local tasks, group tasks, and tasks for device sets.

The Add Key, Update, and Rollback tasks are not applicable if the application is used in Light Agent mode to protect virtual environments.

You can perform the following actions with tasks:

For general information about the tasks in the Web Console, refer to Kaspersky Security Center documentation.

In this section

Creating a new task

Editing task settings

Actions on tasks

Deleting a task

Page top

[Topic 202142]

Creating a new task

To create a task:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. Click Add.

    The Task Wizard starts.

  3. In the New task window, configure the task settings:
    1. In the Application drop-down list, select Kaspersky Endpoint Security 12.0 for Linux.
    2. In the Task type drop-down list, select the type of task that you want to create.
    3. In the Task name field, enter a brief description, for example, Update the application for Accounting.
    4. In the Select devices to which the task will be assigned section, select a method for specifying devices.
    5. Click Next.
  4. In the Task scope window, select the devices and click Next.
  5. Complete the wizard.

A new task will be displayed in the list of tasks. The task will have the default settings. To configure the task settings, go to the task properties window. To run a task, select the check box next to the task and click the Start button.

In the list of tasks, you can monitor the task execution results, which include the task status and the statistics for task performance on the devices. You can also create a selection of events to monitor the task execution (Monitoring and reportsEvent selections). For details on event selection, refer to Kaspersky Security Center documentation.

Task execution results are also saved locally and in Kaspersky Security Center reports.

Page top

[Topic 202144]

Editing task settings

To edit task settings:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. In the list, select the task for which you want to modify the settings, and click the link with the task name to open the task properties window.
  3. Edit the task settings.
  4. Click Save.

The task is saved with the updated settings.

Page top

[Topic 246013]

Actions on tasks

To start, pause, resume, stop, export, or import a task:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. In the list of tasks, check the box next to the name of the required task and click the action button above the list of tasks.
Page top

[Topic 246016]

Deleting a task

To delete the task:

  1. In the main window of Web Console, select DevicesTasks.

    The list of tasks opens.

  2. In the list of tasks, select the check box next to the task that you want to delete.

    You can select several tasks to delete them simultaneously.

  3. Click the Delete button above the list of tasks.
  4. Confirm the deletion.
Page top

[Topic 246684]

Task settings

The following types of tasks are provided for managing Kaspersky Endpoint Security by means of the Web Console:

  • Add Key. During the task execution, the application adds a key, including a reserve one, to activate the application.
  • Inventory Scan. During the task execution, the application receives information about all executable files stored on the devices.
  • Update. During the task execution, the application updates the databases in accordance with the configured update settings.
  • Rollback. During the task execution, the application rolls back the last database update.
  • Malware Scan. During the task execution, the application scans the device areas that are specified in the task settings for viruses and other malware.
  • Critical Areas Scan. During the task execution, the application scans boot sectors, startup objects, process memory, and kernel memory.
  • Container Scan. During the task execution, the application scans containers and images for viruses and other malware.
  • System Integrity Check. During the task execution, the application determines changes of each object by comparing the current state of the monitored object to its original state, which was previously established as a baseline.

The set of policy settings and default values for task settings depend on the license type. The Add Key, Update and Rollback tasks are not applicable if the application is used in Light Agent mode to protect virtual environments. Additionally, some application functions are not supported in a KESL container.

In this section

Add Key

Inventory

Update

Rollback

Malware Scan

Critical Areas Scan

Container Scan

System Integrity Check

Page top

[Topic 247232]

Add a key

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, activation of the application using the Add key task is not supported.

Using the Add Key task, you can add a key to activate Kaspersky Endpoint Security.

Add a key task settings

Setting

Description

Use as a reserve key

This check box enables or disables the usage of the key as a reserve key.

If this check box is selected, the application uses the key as a reserve key.

If this check box is cleared, the application uses the key as an active key.

This check box is cleared by default.

The check box is unavailable if you are adding a trial license key or a subscription key.

A trial license key and a subscription key cannot be added as a reserve key.

License information

This section contains information about the key and the license corresponding to this key:

  • License key – unique alphanumeric sequence.
  • License type can be trial, commercial, or commercial (subscription).
  • License validity period is the number of days during which you can use the application activated by this key (for example, 365 days). This information is not displayed if you use the application under a subscription.
  • Expires on is the date and time when the application activated by this key expires, in UTC. If you use the application under an unlimited subscription, the license expiration date is not specified.
  • Limit is the maximum number of devices that the application can protect.
  • Description – description of the license.

Select key

Clicking this button opens the Kaspersky Security Center key storage window. In this window, you can select keys added to Kaspersky Security Center key storage and add keys to Kaspersky Security Center key storage.

Page top

[Topic 247237]

Kaspersky Security Center key storage window

In this window, you can select keys added to Kaspersky Security Center key storage and add keys to Kaspersky Security Center key storage.

Settings in the Kaspersky Security Center key storage window

Setting

Description

Key table

The table contains the keys added to Kaspersky Security Center key storage and consists of the following columns:

  • License type can be one of the following: trial, commercial, or commercial (subscription).
  • Expires on is the expiration date of the application activated by this key.
  • License validity period is the number of days during which you can use the application activated by this key (for example, 365 days). This information is not displayed if you use the application under a subscription.
  • Limit is the maximum number of devices that the application can protect.
  • Description – description of the license.
  • License key – unique alphanumeric sequence.

Add a key

Clicking this button launches the Add license key wizard. The key will be added to Kaspersky Security Center key storage. After adding a key, information about it will be displayed in the key table.

Page top

[Topic 246661]

Inventory

The Inventory task provides information about all applications executable files stored on the client devices. Obtaining information about the applications installed on the devices can be useful, for example, for creating Application Control rules.

This feature is not supported in the KESL container.

To use the task, a license that includes the corresponding function is required.

The Kaspersky Security Center database can store information about up to 150,000 processed files. When this number of records is reached, new files will not be processed. To resume the Inventory task, delete the files registered in the Kaspersky Security Center database as a result of previous inventories, from the device where Kaspersky Endpoint Security is installed.

Page top

[Topic 246662]

Scan settings section (Inventory)

Inventory task settings

Setting

Description

Add files to the Golden Image category

The check box enables or disables adding applications detected on the device by the Inventory task to the Golden Image category. If the check box is selected, you can use the "Golden Image" category in the Application Control rules.

This check box is cleared by default.

Scan all executables

This check box enables or disables of executable file scans.

The check box is selected by default.

Scan binaries

This check box enables or disables of binary file scans (with extensions elf, java, and pyc).

The check box is selected by default.

Scan scripts

This check box enables or disables script scans.

The check box is selected by default.

Inventory scopes

The table contains the inventory scopes scanned by the application. The application will scan files and directories located in the paths specified in the table. By default, the table contains one inventory scope – /usr/bin.

You can add, configure, delete, move up, or move down inventory scan scopes in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

Clicking the scan scope name opens the <Scan scope name> window. In this window, you can modify the settings of the selected scan scope.

Clicking the Add button opens the <New scan scope> window. In this window, you can define a new scan scope.

Page top

[Topic 218706]

Add scan scope window

In this window, you can add and configure scan scope for the Inventory task.

Inventory scope settings

Setting

Description

Scope name

Field for entering the inventory scope name. This name will be displayed in the table in the Scan settings section.

The entry field must not be blank.

Use this scope

This check box enables or disables the scan of this scope when the task is performed.

If this check box is selected, the application processes this inventory scope while running the task.

If this check box is cleared, the application does not process this inventory scope while running the task. You can later include this scope in task settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the inventory scan scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank. The / path is specified by default – the application scans all directories of the local file system.

Masks

This list contains name masks of the objects that the application scans while running the task.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246663]

Exclusion scopes section

In the Exclusion scopes section for the Inventory task, you can configure the scopes to be excluded from scans.

Page top

[Topic 197613_1]

Exclusion scopes window

This table contains scan exclusion scopes. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from scan.

Status

The status indicates whether the application uses this exclusion.

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 219608]

Add exclusion scope window

In this window, you can add and configure scan exclusion scope for the Inventory task.

Exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window.

The entry field must not be blank.

Use this scope

This check box enables or disables the exclusion of the scope when the task is executed.

If this check box is selected, the application excludes this scope during task execution.

If this check box is cleared, the application includes this scope during task execution. You can later exclude this scope from scanning by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to exclude from the inventory. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

Masks

The list contains name masks of the objects that the application excludes from scan.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246656]

Update

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the application databases and modules cannot be updated using the task created in Kaspersky Security Center. Updates are performed using a local predefined task.

Updating the databases and application modules of Kaspersky Endpoint Security ensures up-to-date protection on your device. New viruses and other types of malware appear worldwide on a daily basis. The application databases contain information about the threats and the ways to neutralize them. To detect threats quickly, you are urged to regularly update the application databases and modules.

Page top

[Topic 246657]

Update source section

An update source is a resource that contains updates for Kaspersky Endpoint Security databases and application modules. Update sources can be FTP, HTTP, or HTTPS servers (such as Kaspersky Security Center and Kaspersky update servers), as well as local or network directories mounted by the user.

Update source settings for the Update task

Setting

Description

Update source

In this section, you can select the update source:

  • Kaspersky update servers, where database updates for Kaspersky applications are published (default value).
  • Kaspersky Security Center – Kaspersky Security Center Administration Server (this option is available only for the Web Console).
  • Distribution Points (this option is available only for the Kaspersky Security Center Cloud Console).
  • Other sources on the local or global network – HTTP, HTTPS, or FTP servers or directories on local network servers.

Use Kaspersky update servers if other update sources are not available

The check box enables or disables usage Kaspersky update servers as the update source, if the selected update sources are not available.

This check box is available if under Update sources, the Other sources on the local or global network or Kaspersky Security Center option is selected.

The check box is selected by default.

Custom update sources

This table contains a list of custom sources of database updates. During the update process, the application accesses update sources in the order they appear in the table.

The table contains the following columns:

  • Update source is HTTP, HTTPS, or FTP servers or directories on local network servers.
  • The toggle button shows whether the source is used in the task (Enabled or Disabled). You can enable or disable the toggle button in the table, as well as select or clear the Use this source check box in the Update source window, which opens by clicking the link with the source name.

     

This table is available if the Other sources on the local or global network option is selected.

The table is empty by default.

You can add, edit, delete, move up, or move down update sources in the table.

Clicking the Move down button moves the selected item down in the table.

This button is available if only one item is selected in the table.

Clicking the Move up button moves the selected item up in the table.

This button is available if only one item is selected in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246659]

Settings section

In the Settings section, you can specify the response timeout and the application update download settings.

Update task settings

Setting

Description

Maximum time to wait for a response from the update source (sec)

The maximum period of time that the application waits for a response from the selected update source (in seconds). When no response has arrived by this time, an event involving a loss of communication with the update source is logged in the task log.

Available values: 0-120. If 0 is specified, the period of time that the application waits for a response from the selected source is unlimited.

Default value: 10 seconds.

Application update download mode

In the drop-down list, you can select the mode for updating application databases:

  • Do not download updates. If this list item is selected, the application cannot be updated.
  • Download only update files, but do not install them on client devices (default value).
  • Download and install updates to client devices. After updates are installed, the application will restart automatically.

     

This feature is not supported in the KESL container.

Page top

[Topic 246687]

Rollback

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the task cannot be used to rollback database updates.

After the application databases are updated for the first time, the rollback of the application databases to their previous versions becomes available.

Every time a user starts the update process, Kaspersky Endpoint Security creates a backup copy of the current application databases. This allows you to roll back the application databases to a previous version if needed.

Rolling back the last database update may be useful, for example, if the new application database version contains invalid signatures, which causes Kaspersky Endpoint Security to block safe applications.

The rollback task does not have any settings.

Page top

[Topic 246648]

Malware Scan

Malware Scan is a one-time full or custom scan of files on the device performed by the application. The application can carry out multiple malware scanning tasks at the same time.

By default, the application creates one standard virus scan task — a full scan. The application scans all the objects located on the local drives of the device, as well as all mounted and shared objects that are accessed via the Samba and NFS protocols with the recommended security settings.

During a full disk scan, the processor is busy. It is recommended to run the full scan task when the business is idle.

Page top

[Topic 246653]

Scan settings section (Malware Scan)

Malware Scan task settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

Scan scopes

The table that contains the scopes scanned by the task. By default, the table contains one scan scope that includes all directories of the local file system.

You can add, configure, delete, move up, or move down scan scopes in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

Clicking the scan scope name opens the <Scan scope name> window. In this window, you can modify the settings of the selected scan scope.

Clicking the Add button opens the <New scan scope> window. In this window, you can define a new scan scope.

Page top

[Topic 248956_1]

Add scan scope window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scope name

Field for entering the scan scope name. This name is displayed in the Scan scopes table in the Scan settings section.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

You can select the type of file system in the drop-down list:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Shared or Mounted type is selected in the drop-down list of file systems.

Path

This is the entry field for specifying the path to the directory that you want to include in the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

This field is available if the Local type is selected in the drop-down list of file systems.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246654]

Scan scopes section

You can configure scan scope settings for the Malware Scan task. The application allows you to scan files, boot sectors, client device memory, and startup objects.

Malware Scan scope task settings

Setting

Description

Scan files

This check box enables or disables file scans.

If the check box is selected, the application scans the files.

If the check box is cleared, the application does not scan the files.

The check box is selected by default.

Scan boot sectors

This check box enables or disables boot sector scans.

If the check box is selected, the application scans the boot sectors.

If the check box is cleared, the application does not scan the boot sectors.

This check box is cleared by default.

Scan kernel memory and running processes

This check box enables or disables client device memory scan.

If the check box is selected, the application scans kernel memory and running processes.

If the check box is cleared, the application does not scan kernel memory and running processes.

This check box is cleared by default.

Scan startup objects

This check box enables or disables startup object scans.

If the check box is selected, the application scans startup objects.

If the check box is cleared, the application does not scan startup objects.

This check box is cleared by default.

Devices to scan

Clicking the Configure device masks link opens the Scan scopes window, where you can specify the devices whose boot sectors will be scanned.

Page top

[Topic 215174_2]

Scan scopes window

The table contains name masks of the devices, whose boot sectors the application must scan. By default, the table contains the /** device name mask (all devices).

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246655]

Exclusion scopes section (Malware Scan)

In the Exclusion scope section, you can configure exclusion scopes as well as exclusions by mask and by the threat name for the Malware Scan task.

Page top

[Topic 246665]

Critical Areas Scan

The Critical Areas Scan task allows you to scan files, boot sectors, startup objects, process memory, and kernel memory.

Page top

[Topic 246664]

Scan settings section (Critical Areas Scan)

Critical Areas Scan task settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Notify about unprocessed files

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

Scan scopes

The table that contains the scopes scanned by the task. By default, the table contains one scan scope that includes all directories of the local file system.

You can add, configure, delete, move up, or move down scan scopes in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

Clicking the scan scope name opens the <Scan scope name> window. In this window, you can modify the settings of the selected scan scope.

Clicking the Add button opens the <New scan scope> window. In this window, you can define a new scan scope.

Page top

[Topic 248956_2]

Add scan scope window

In this window, you can add and configure scan scopes.

Scan scope settings

Setting

Description

Scope name

Field for entering the scan scope name. This name is displayed in the Scan scopes table in the Scan settings section.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application processes this scan scope.

If this check box is cleared, the application does not process this scan scope. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

You can select the type of file system in the drop-down list:

  • Local (default value) – local directories. If this item is selected, you need to indicate the path to the local directory.
  • Mounted – Mounted remote or local directories. If this item is selected, you need to indicate the protocol or name of the file system.
  • Shared — The protected server's file system resources accessible via the Samba or NFS protocol.
  • All remote mounted – all remote directories mounted on the device using the Samba and NFS protocols.
  • All shared — All of the protected server's file system resources accessible via the Samba and NFS protocols.

Access protocol

You can select the remote access protocol in the drop-down list:

  • NFS: remote directories mounted on a device using the NFS protocol.
  • Samba: remote directories mounted on a device using the Samba protocol.
  • Custom – resources of the device's file system specified in the field below.

This drop-down list is available if the Shared or Mounted type is selected in the drop-down list of file systems.

Path

This is the entry field for specifying the path to the directory that you want to include in the scan scope. You can use masks and tags to specify the path.

You can use special tags to specify a container or image:

  • [container-id:<identifier>]/<path to local directory>
  • [container-name:<name>]/<path to local directory>
  • [image-id:<identifier>]/<path to local directory>
  • [image-name:<name>]/<path to local directory>

You can also use unique combinations of the [container-id:<identifier>], [container-name:<name>], [image-id:<identifier>] and [image-name:<name>]/<path to local directory> tags.

Any combination of 1 to 4 unique tags within one area is allowed. The order they are listed in is not important.

For example:

  • [container-name:<name>][image-name:<name>]/<path to local directory>
  • [container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [image-name:<name>][image-id:<identifier>]/<path to local directory>
  • [container-name:<name>][container-id:<identifier>][image-name:<name>]/<path to local directory>
  • [container-name:<name>][image-id:<identifier>][container-id:<identifier>][image-name:<name>]/<path to local directory>

You can use masks (? and * characters) in names and identifiers.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The / path is specified by default – the application scans all directories of the local file system.

This field is available if the Local type is selected in the drop-down list of file systems.

If the Local type is selected in the drop-down list of file systems, and the path is not specified, the application scans all directories of the local file system.

Name of shared resource

The field for entering the name of the file system shared resource, where the directories that you want to add to the scan scope are located.

The field is available if the Mounted type is selected in the File system drop-down list and the Custom item is selected in the Access protocol drop-down list.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246666]

Scan scopes section

Scan scope settings for the Critical area scan task

Setting

Description

Scan files

This check box enables or disables file scans.

If the check box is selected, the application scans the files.

If the check box is cleared, the application does not scan the files.

This check box is cleared by default.

Scan boot sectors

This check box enables or disables boot sector scans.

If the check box is selected, the application scans the boot sectors.

If the check box is cleared, the application does not scan the boot sectors.

The check box is selected by default.

Scan kernel memory and running processes

This check box enables or disables client device memory scan.

If the check box is selected, the application scans kernel memory and running processes.

If the checkbox is cleared, the application does not scan kernel memory and running processes.

The check box is selected by default.

Scan startup objects

This check box enables or disables startup object scans.

If the check box is selected, the application scans startup objects.

If the check box is cleared, the application does not scan startup objects.

The check box is selected by default.

Devices to scan

Clicking the Configure device masks link opens the Scan scopes window, where you can specify the devices whose boot sectors will be scanned.

Page top

[Topic 215174_3]

Scan scopes window

The table contains name masks of the devices, whose boot sectors the application must scan. By default, the table contains the /** device name mask (all devices).

You can add, edit, and delete items in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246667]

Exclusion scopes section (Critical Areas Scan)

In the Exclusion scope section, you can configure exclusion scopes as well as exclusions by mask and by the threat name for the Critical Areas Scan task.

Page top

[Topic 246679]

Container Scan

When the Container Scan task is running, Kaspersky Endpoint Security scans containers and images for viruses and other malware. You can run multiple Container Scan tasks simultaneously.

Integration with Docker container management system, CRI-O framework, and Podman and runc utilities is supported.

To use the task, a license that includes the corresponding function is required.

Page top

[Topic 246680]

Scan settings section (Container Scan)

Container scan task settings

Setting

Description

Scan archives

This check box enables or disables scan of archives.

If the check box is selected, the application scans the archives.

To scan an archive, the application has to unpack it first, which may slow down scanning. You can reduce the duration of archive scans by configuring the Skip file that is scanned for longer than (sec) and Skip file larger than (MB) settings in the General scan settings section.

If the check box is cleared, the application does not scan the archives.

The check box is selected by default.

Scan SFX archives

This check box enables or disables self-extracting archive scans. Self-extracting archives are the archives that contain an executable extraction module.

If the check box is selected, the application scans self-extracting archives.

If the check box is cleared, the application does not scan self-extracting archives.

This check box is available if the Scan archives check box is unchecked.

The check box is selected by default.

Scan mail databases

This check box enables or disables scans of mail databases of Microsoft Outlook, Outlook Express, The Bat!, and other mail applications.

If the check box is selected, the application scans mail database files.

If the check box is cleared, the application does not scan mail database files.

This check box is cleared by default.

Scan mail format files

This check box enables or disables scan of files of plain-text email messages.

If this check box is selected, the application scans plain-text messages.

If this check box is cleared, the application does not scan plain-text messages.

This check box is cleared by default.

Skip file that is scanned for longer than (sec)

In this field, you can specify the maximum time to scan a file, in seconds. After the specified time, the application stops scanning the file.

Available values: 0–9999. If the value is set to 0, the scan time is unlimited.

Default value: 0.

Skip file larger than (MB)

In this field, you can specify the maximum size of a file to scan, in megabytes.

Available values: 0–999999. If the value is set to 0, the application scans files of any size.

Default value: 0.

Log clean objects

This check box enables or disables the logging of ObjectProcessed type events.

If this check box is selected, the application logs events of the ObjectProcessed type for all scanned objects.

If this check box is cleared, the application does not log events of the ObjectProcessed type for any scanned object.

This check box is cleared by default.

Log unprocessed objects

This check box enables or disables the logging ObjectNotProcessed type events if a file cannot be processed during a scan.

If this check box is selected, the application logs the events of the ObjectNotProcessed type.

If this check box is cleared, the application does not log the events of the ObjectNotProcessed type.

This check box is cleared by default.

Log packed objects

This check box enables or disables the logging of PackedObjectDetected type events for all packed objects that are detected.

If this check box is selected, the application logs the events of the PackedObjectDetected type.

If this check box is cleared, the application does not log the events of the PackedObjectDetected type.

This check box is cleared by default.

Use iChecker technology

This check box enables or disables scan of only new and modified since the last scan files.

If the check box is selected, the application scans only new files or the files modified since the last scan.

If the check box is cleared, the application scans the files regardless of the creation or modification date.

The check box is selected by default.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the use of the iChecker technology is not supported. Scan optimization is implemented by means of the Protection Server.

Use heuristic analysis

This check box enables or disables heuristic analysis during file scans.

The check box is selected by default.

Heuristic analysis level

If the Use heuristic analysis check box is selected, you can select the heuristic analysis level in the drop-down list:

  • Light is the least detailed scan with minimal system load.
  • Medium is a medium scan with balanced system load.
  • Deep is the most detailed scan with maximum system load.
  • Recommended (default value) is the optimal level recommended by Kaspersky experts. It ensures an optimal combination of protection quality and impact on the performance of the protected devices.

First action

In this drop-down list, you can select the first action to be performed by the application on an infected object that has been detected:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it (default value).
  • Skip the object.

Second action

In this drop-down list, you can select the second action to be performed by the application on an infected object, in case the first action is unsuccessful:

  • Disinfect the object. A copy of the infected object will be saved in the Storage.
  • Remove the object. A copy of the infected object will be saved in the Storage.
  • Perform recommended action on the object, based on data about the danger level of the threat detected in the file and about the possibility of disinfecting it.
  • Skip the object (default value).

Scan containers

This check box enables or disables container scans. If the check box is selected, you can specify a name or a name mask for containers to be scanned.

The check box is selected by default.

Name mask

Entry field for a name or a name mask for containers to be scanned.

By default, the * mask is specified – all containers will be scanned.

Action on threat detection

You can select the action that the application performs on a container when it detects an infected object:

  • Skip container – do not perform any actions on the container when an infected object is detected.
  • Stop container – stop container when an infected object is detected.
  • Stop container if disinfection fails (default value) – stop the container if disinfection of the infected object or elimination of the threat fails.

Due to the way a CRI-O environment works, an infected object is not disinfected or deleted in a container in a CRI-O environment. We recommend to select the Stop container action.

Scan images

This check box enables or disables the image scan. If the check box is selected, you can specify a name or a name mask for images to be scanned.

The check box is selected by default.

Name mask

Entry field for a name or a name mask for images to be scanned.

By default, the * mask is specified (all images are scanned).

Action on threat detection

You can select the action that the application performs on a container when it detects an infected object:

  • Skip image (default value) – do not perform any actions on the image when an infected object is detected.
  • Delete image when an infected object is detected (not recommended). All dependencies will also be deleted. Running containers will be stopped, and then deleted.

Scan each layer

This check box enables or disables the scanning of all layers of images and running containers.

This check box is cleared by default.

Page top

[Topic 246681]

Exclusion scopes section (Container Scan)

In the Exclusion scopes section, you can configure exclusions by mask and by threat name for the Container scan task.

Page top

[Topic 246668]

System Integrity Check

While the System Integrity Check (ODFIM) task is running, each object change is determined by comparing the current state of the monitored objects with its original state, which was previously established as a baseline.

To use the task, a license that includes the corresponding function is required.

This feature is not supported in the KESL container.

The system baseline is created during the first run of the ODFIM task on the device. You can create several ODFIM tasks. For each ODFIM task, a separate baseline is created. The task is performed only if the baseline corresponds to the monitoring scope. If the baseline does not match the monitoring scope, Kaspersky Endpoint Security generates a system integrity violation event.

The baseline is rebuilt after an ODFIM task has finished. You can rebuild a baseline for a task using the corresponding setting. Also, a baseline is rebuilt when the settings of a task change, for example, if a new monitoring scope is added. The baseline will be rebuilt during the next task run. You can delete a baseline by deleting the corresponding ODFIM task.

Page top

[Topic 246669]

Scan settings section (System Integrity Check)

System Integrity Check task settings

Setting

Description

Rebuild baseline on each task start

This check box enables or disables the rebuilding of the system baseline every time the System Integrity Check task is started.

This check box is cleared by default.

Use hash for monitoring (SHA-256)

This check box enables or disables the use of the file hash as a criterion when comparing the current state of the file with its original state.

If this check box is cleared, the application compares only the file size (if the file size has not changed, then the modification time is not considered a critical parameter).

This check box is cleared by default.

Track directories in monitoring scopes

This check box enables or disables directory monitoring while system integrity check is running.

This check box is cleared by default.

Track last file access time

This check box enables or disables tracking the file access time while the System Integrity monitoring runs.

This check box is cleared by default.

Monitoring scopes

The table that contains the monitoring scopes scanned by the task.

By default, the table contains the Kaspersky internal objects (/opt/kaspersky/kesl/) monitoring scope.

You can add, configure, delete, move up, or move down monitoring scopes in the table.

Clicking the Move down button moves the selected item down in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Move up button moves the selected item up in the table.

Kaspersky Endpoint Security scans objects in the specified scopes in the order they are listed in the table of scan scopes. If you want to configure security settings for a subdirectory that are different from the security settings of the parent directory, you must place the subdirectory higher than its parent directory in the table.

This button is available if a scope is selected in the table.

Clicking the Delete button excludes the selected scope from scans.

This button is available if at least one scan scope is selected in the table.

Clicking the scan scope name opens the <Scan scope name> window. In this window, you can modify the settings of the selected scan scope.

Clicking the Add button opens the <New scan scope> window. In this window, you can define a new scan scope.

Page top

[Topic 218702]

Add scan scope window

In this window, you can add or configure the monitoring scope for the System Integrity Check task.

Monitoring scope settings

Setting

Description

Scope name

Field for entering the monitoring scope name. This name will be displayed in the table in the Scan settings section.

The entry field must not be blank.

Use this scope

This check box enables or disables scans of this scope by the application.

If this check box is selected, the application controls this monitoring scope during the application's operation.

If this check box is cleared, the application does not control this monitoring scope during the operation. You can later include this scope in the component settings by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to include in the monitoring scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

The / path is specified by default – the application scans all directories of the local file system.

Masks

The list contains name masks for the objects that the application scans.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246675]

Exclusion scopes section

In the Exclusion scopes section for the System Integrity Check task, you can also configure exclusion scopes for the scan and exclusions by mask.

Page top

[Topic 246676]

Exclusion scopes window

The table contains monitoring exclusion scopes for the System Integrity Check component. The application does not scan files and directories located at the paths specified in the table. By default, the table is empty.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Exclusion scope name.

Path

Path to the directory excluded from monitoring.

Status

Indicates whether the application excludes this scope from monitoring during the task operation.

You can add, edit, and delete items in the table.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 246677]

Add exclusion scope window

In this window, you can add and configure the monitoring exclusion scope for the System Integrity Check task.

Monitoring exclusion scope settings

Setting

Description

Exclusion scope name

Field for entering the exclusion scope name. This name will be displayed in the table in the Exclusion scopes window. The entry field must not be blank.

Use this scope

The check box enables or disables the exclusion of the scope from monitoring when the application is running.

If this check box is selected, the application excludes this scope from monitoring during the task operation.

If this check box is cleared, the application monitors this scope during the task operation. You can later exclude this scope from monitoring by selecting the check box.

The check box is selected by default.

File system, access protocol, and path

Entry field for the path to the local directory that you want to add to the exclusion scope. You can use masks to specify the path.

You can use the * (asterisk) character to create a file or directory name mask.

You can indicate a single * character to represent any set of characters (including an empty set) preceding the / character in the file or directory name. For example, /dir/*/file or /dir/*/*/file.

You can indicate two consecutive * characters to represent any set of characters (including an empty set and the / character) in the file or directory name. For example, /dir/**/file*/ or /dir/file**/.

The ** mask can be used only once in a directory name. For example, /dir/**/**/file is an incorrect mask.

You can use a single ? character to represent any one character in the file or directory name.

The field must not be blank.

The / path is specified by default. The application excludes all directories of the local file system from scan.

Masks

The list contains name masks of the objects that the application excludes from the monitoring.

By default the list contains the * mask (all objects).

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens a window where you can specify the new item settings.

Page top

[Topic 202412_3]

Exclusions by mask window

You can configure the exclusion of objects from monitoring based on name masks. The application does not scan the files with the names containing the specified masks. By default, the list of masks is empty.

You can add, edit, or delete masks.

Clicking the Delete button removes the selected item from the table.

This button is available if at least one item is selected in the table.

The selected element's settings are changed in a separate window.

Clicking the Add button opens the Object mask window. In this window, in the Define object mask field, you can specify the name template for files that Kaspersky Endpoint Security excludes from scans.

Examples:

The *.txt mask refers to all text files.

The *_my_file_??.html mask refers to html files starting with any characters, and ending with _my_file_ followed by any two characters (for example, 2020_my_file_09.html).

Page top

[Topic 246026]

Configuring integration with Kaspersky Managed Detection and Response

To configure integration between Kaspersky Endpoint Security and Kaspersky Managed Detection and Response (MDR), perform the following actions:

  • Make sure that the File Threat Protection and Behavior Detection components are enabled in the Kaspersky Endpoint Security policy.
  • In the Kaspersky Endpoint Security policy in the Web Console, select the use of Kaspersky Security Network with statistics.
  • In the Kaspersky Endpoint Security policy in the Web Console, enable integration with Managed Detection and Response and upload a BLOB configuration file, which is located in the ZIP archive of the MDR configuration file (see the instructions below).
  • In the Web Console, configure Private KSN for sending telemetry using a Kaspersky Security Network configuration file, which is located in the ZIP archive of the MDR configuration file (see the instructions below).

To configure Private KSN for integrating the application with Kaspersky Managed Detection and Response in the Web Console:

  1. In the main Web Console window, click Settings_button next to the name of the Administration Server.

    The Administration Server properties window opens.

  2. In the list on the left, select the KSN proxy server settings section.
  3. Turn on the Enable KSN proxy server on the Administration Server as a proxy server toggle switch to enable the KSN proxy server service.
  4. Turn on the Use Kaspersky Private Security Network toggle switch.
  5. In the window that opens and displays a warning about the specific aspects of using the KSN proxy server on the distribution points with the previous version of the Network Agent installed, click OK.
  6. Click the File with KSN proxy server settings button.
  7. Select the configuration file with the pkcs7 extension and click Open.

    This configuration file is included in Kaspersky Managed Detection and Response distribution kit.

    By downloading Kaspersky Managed Detection and Response configuration file, you agree to automatically transmit data from the device with Kaspersky Endpoint Security installed to Kaspersky for processing. Do not load the configuration file if you do not agree that the transmitted data will be processed. For detailed description of the transmitted data, refer to Kaspersky Managed Detection and Response documentation.

  8. Click Save.

To load the BLOB configuration file using the Web Console:

  1. In the main window of the Web Console, select DevicesPolicies and policy profiles.

    The list of policies opens.

  2. In the list, select the required policy and click the link with the policy name to open the policy properties window.
  3. On the Application settings tab, in the list on the left, select the General settings section.
  4. In the right section of the window, select the Managed Detection and Response section.
  5. In the window that opens, enable Managed Detection and Response.
  6. Click Download.
  7. In the window that opens, select the BLOB configuration file and click the Open button.

    The BLOB configuration file is included in Kaspersky Managed Detection and Response distribution kit.

    By downloading Kaspersky Managed Detection and Response configuration file, you agree to automatically transmit data from the device with Kaspersky Endpoint Security installed to Kaspersky for processing. Do not load the configuration file if you do not agree that the transmitted data will be processed. For detailed description of the transmitted data, refer to Kaspersky Managed Detection and Response documentation.

  8. Click OK.
  9. Click Save.
Page top

[Topic 219387]

Configuring KESL container settings

Kaspersky Endpoint Security distribution kit contains files for creating a container application (KESL container) for embedding into external systems in order to scan container images from image repositories.

If Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments, the KESL container functionality is not supported.

Interaction with the KESL container is implemented using the REST API. You can configure KESL container settings using the Web Console.

For correct operation of KESL containers in the Web Console, it is recommended to move the devices that correspond to the KESL containers to a separate administration group with its own policy. When the KESL container is stopped, these devices are automatically removed from the administration group, and the key that was used on these devices is released.

After deploying, activating and configuring the KESL container, it provides following functionalities in the Web Console:

Other application functions and settings can be configured, but their configuration does not affect KESL container operation.

If KESL container was activated during deployment and is connected to Kaspersky Security Center, where automatic key distribution to managed devices is configured, this key will not be applied to the KESL container.

Page top

[Topic 256545]

Configuring remote diagnostics of client devices

You can use remote diagnostics to perform the following operations remotely on client devices:

  • Enable or disable tracing.
  • Change the trace level.
  • Load a trace file.
  • Downloading a remote application installation log.
  • Download system event (syslog) logs.
  • Starting, stopping, and restarting applications.

Remote diagnostics of a client device is performed using the Administration Server in the remote diagnostics window.

For more information about the remote diagnostics, refer to Kaspersky Security Center Web Console documentation.

To open the remote device diagnostics window for a device:

  1. In the main window of the Web Console, select DevicesManaged devices.

    The list of managed devices opens.

  2. In the list of managed devices, select the device for which you want to perform remote diagnostics, and click the link with the device name to open the device properties window.
  3. On the Advanced tab, select the Remote diagnostics section.

In the device remote diagnostics window, you can view the remote installation log.

To view the remote installation log on a device, do as follows:

  1. Open the remote device diagnostics window.
  2. On the Event logs tab, under Trace files, click Remote installation logs.

    The Device trace event logs window opens.

Page top

[Topic 198060]

Managing application using graphical user interface

You can manage Kaspersky Endpoint Security operation using the graphical user interface.

In this Help section

Application interface

Task management

Configuring Kaspersky Security Network

Viewing reports

Viewing objects in the Storage

Viewing licensing information

Creating a trace file

Page top

[Topic 247112]

Application interface

Application icon in the notification area

After Kaspersky Endpoint Security graphical user interface package is installed, the application icon appears on the right, in the taskbar notification area.

The application icon acts as a shortcut to the context menu and the main application window. You can open the context menu of an application icon by right-clicking the icon.

The context menu of the application icon contains the following items:

  • Kaspersky Endpoint Security 12.0 for Linux. Opens the main application window, which displays the protection status of your device and contains interface elements that provide access to the application functions.
  • Exit. Exits the application graphical user interface.

Main application window

The main application window is divided into several parts:

  • The central part of the main application window displays the protection status of your device. Clicking this part of the window opens the Protection Center window. This window displays information about the protection status of your device and recommendations on the actions to be performed to fix protection problems (if any).
  • The Scan button displays the Malware Scan task status and the number of detected threats. Clicking this button opens the Scan window. In this window, you can start and stop the Malware Scan, Critical Areas Scan and Container Scan tasks. Also, you can view reports for these tasks.
  • The Update button displays the status of the Update task. Clicking this button opens the Update window. In this window, you can start the Update and Rollback tasks. Also, you can view reports for these tasks.
  • The lower part of the main application window contains the following elements:
  • The lower part of the main application window displays information about the license and the key, as well as about licensing problems (if any). Clicking this part of the window opens the License window. This window also displays detailed information about the license. You can also open this window from the Support window using the link with the license key.

To open the main application window, perform one of the following actions:

  • Right-click or double-click the application icon in the notification area of the taskbar.
  • Select the application name in the application menu of the operating system window manager.
Page top

[Topic 247113]

Managing tasks

The application graphical user interface allows you to enable or disable the following application monitoring tasks:

The application graphical user interface also allows you to run the following tasks on demand:

Additionally, the following tasks can operate in Notify only mode. In this case, the interface displays a Notify only mode is selected warning:

In this section

Enabling and disabling application monitoring tasks

Starting and stopping scan tasks

Start and stop the Update tasks

Page top

[Topic 198067]

Enabling and disabling application monitoring tasks

You can enable or disable the monitoring tasks of the application. If the task is enabled, the Disable button is available. By default, the following tasks are enabled: File Threat Protection, Web Threat Protection, Device Control, and Behavior Detection.

If a task is disabled, the Enable button is available.

To enable or disable an application monitoring task:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Settings button.

    The Settings window opens.

  3. Do one of the following for the required task:
    • Click Enable to enable the task.
    • Click Disable to disable the task.
Page top

[Topic 247114]

Starting and stopping scan tasks

Using the application's graphical user interface, you can start and stop the Malware Scan, Critical Areas Scan and Container Scan tasks.

To start or stop a scan task:

  1. Open the main application window.
  2. In the main application window, select the Scan section.

    The Scan window will open.

  3. Do one of the following:
    • To start a scan task, click the Start button under the scan task that you want to start.

      The progress of the running scan task is displayed.

    • To stop a scan task, click the Stop button under the scan task that you want to stop.

      The scan task stops, and information about the scanned objects and detected threats is displayed.

  4. To view the report on the scan task, click the Show report button.

When an infected object is detected or the scan task is completed, a pop-up window appears in the notification area near the application icon on the right side of the taskbar.

The Scan window also displays the progress and the results of the temporary Scan_Boot_Sectors_ {ID} and Scan_File_ {ID} tasks. You can hide information about temporary tasks that are already completed by clicking the cross or by closing the Scan window (when switching to the main window or when exiting the application).

Page top

[Topic 198066]

Start and stop the Update tasks

Using the application graphical user interface, you can run the Update and Rollback.

To start or stop a database update task:

  1. Open the main application window.
  2. In the main application window, select the Update section.

    The Update window opens.

  3. Do one of the following:
    • To start a task, click the Start button under the task that you want to start.

      The progress of the running update task is displayed.

      If the Update task finishes successfully, the Roll back update link becomes available, and you can roll back the last successful database update.

    • To stop a task, click the Stop button under the scan task that you want to stop.

      The Update task stops.

  4. To view the report on the task, click the Show report button.

To start a rollback task:

  1. Open the main application window.
  2. In the main application window, select the Update section.

    The Update window opens.

  3. Run the Rollback task by clicking the Roll back update link.
Page top

[Topic 246847]

Configuring Kaspersky Security Network

Using the graphical user interface, you can enable or disable Kaspersky Security Network usage.

To enable use of Kaspersky Security Network:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Settings button.

    The Settings window opens.

  3. In the Settings window, select one of the following options:
    • Extended KSN mode, if you want to use Kaspersky Security Network, obtain information from the knowledge base, and send anonymous statistics and information about the types and sources of threats.
    • Basic KSN mode, if you want to use Kaspersky Security Network, obtain information from the knowledge base, but not to send anonymous statistics and information about the types and sources of threats.
  4. Click the Enable button.

    The Using Kaspersky Security Network window opens.

  5. In the Using Kaspersky Security Network window, carefully read the Kaspersky Security Network Statement and select the I confirm that I have fully read, understand, and accept the terms and conditions of the Kaspersky Security Network Statement option.
  6. Click OK.

    The OK button is not available if none of the options are selected in the Use of Kaspersky Security Network window.

To disable use of Kaspersky Security Network:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Settings button.

    The Settings window opens.

  3. Click Enable.
  4. In the window that opens, click the Yes button to decline use of Kaspersky Security Network.
Page top

[Topic 247111]

Viewing reports

Information about operation of the application tasks is recorded to the application reports.

Report data is presented as a table that contains a list of events. Each line in the table contains information about a separate event. Event attributes are displayed in the table columns. Events logged during the performance of various tasks have different sets of attributes.

The following event importance levels are used in reports:

  • Critical – events with the critical importance level that need your attention as they indicate problems in the application operation or vulnerabilities in the device protection
  • High
  • Medium
  • Low
  • Information
  • Error

The application provides the following reports listed in the left part of the Reports window:

  • Statistics. This report contains statistical information about the File Threat Protection task and scan tasks. You can update the displayed report by clicking the Reload button.
  • System audit. This report contains information about events that occur during the application operation and during the user interaction with the application.
  • Threat protection. This report contains information about the events that are logged while the following application monitoring tasks were running:
    • Anti-Cryptor.
    • System Integrity Monitoring.
    • Firewall Management.
    • Web Threat Protection.
    • Application Control.
    • Device Control.
    • Removable Drives Scan.
    • Network Threat Protection.
    • Behavior Detection.
    • File Threat Protection.
  • On-demand tasks. This report contains information about the events that are logged while the following application tasks were running:
    • Scan tasks.
    • Update.
    • System Integrity Check.

To view the report:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Reports button.

    The Reports window will open.

  3. In the left part of the Reports window, select the required report type.

    A report containing a list of events is displayed in the right part of the window.

    By default, events are sorted in ascending order by the values in the Date column.

  4. To view detailed information about an event displayed in a separate section of the report, select this event in the report.

    The section that contains the attributes of this event is displayed at the bottom of the window.

For convenient processing of reports, you can modify the presentation of data on the screen in the following ways:

  • Filter the list of events by occurrence time.
  • Use the search function to find a specific event.
  • View the selected event in a separate section.
Page top

[Topic 198073]

Viewing objects in the Storage

To view objects in Storage:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Storage button.

    The Storage window opens.

In this window the following information about the objects in Storage is displayed:

  • Object name.
  • Full path to an object.
  • Date when the object was added to the Storage.
  • Date when the object was removed from the Storage (this field is displayed if the DaysToLive setting is specified).
  • Object size.

You can restore objects from the Storage to their original directories. You can also delete objects from the Storage. Deleted objects cannot be restored in the future. Information about these actions is recorded in the event log.

Page top

[Topic 214369]

Viewing licensing information

To view license information:

  1. Open the main application window.
  2. Do one of the following:
    • In the lower part of the main application window, click the area, which displays information about the license and the key.
    • In the lower part of the main application window, click the Support button and in the Support window that opens, open the License window using the link with a unique alphanumeric sequence, which is displayed in the Key field.

    The License window opens.

This window displays the following information about the license:

  • Active key – unique alphanumeric sequence.
  • Key status – the status of the key or a message about the problems associated with the key (if any).
  • Valid from – date when the application was activated by adding this key.
  • License expires – the number of days before the license expires and the license expiration date in UTC format.
  • A summary of your license or information about any licensing issues and recommendations on how to resolve the issues, if any.

Clicking the Details link displays the following information:

  • Application name is the name of the application for which the license associated with the key is intended.
  • Protection – Information about the available application functions and a list of available application components (availability of application functions and components depends on the license).
Page top

[Topic 198074]

Creating a trace file

To create a trace file:

  1. Open the main application window.
  2. In the lower part of the main application window, click the Support button.

    The Support window opens.

  3. Click the Tracing link to open the Tracing window
  4. In the Level drop-down list, select the level of detail for the trace file.

    You are advised to clarify the required level of detail with a Kaspersky Technical Support specialist. The default value is Diagnostic (300).

  5. Click the Enable button to start tracing.
  6. Reproduce the situation which caused the problem.
  7. Click the Disable button to stop tracing.

Created trace files are stored in /var/log/kaspersky/kesl/ directory. Trace files contain information about the operating system, and may also contain personal data.

Page top

[Topic 236027]

Application components integrity check

Kaspersky Endpoint Security contains many various binary modules in the form of dynamic linked libraries, executable files, configuration files, and interface files. Intruders can replace one or more application executable modules or files with other files containing malicious code. To prevent the replacement of modules and files, Kaspersky Endpoint Security can check integrity of the application components. The application checks modules and files for unauthorized changes or corruption. If an application module or file has an incorrect checksum, it is considered to be corrupted.

An integrity check is run for the following application components if installed on the device:

  • application package
  • Graphical user interface package
  • Kaspersky Security Center Network Agent package
  • Kaspersky Endpoint Security administration plug-in

The application checks integrity of the files in the special lists called manifest files. Each application component has its own manifest file that contains a list of application files whose integrity is important for correct operation of this application component. The name of the manifest file is the same for each component, but the content of the manifest files differs. The manifest files are digitally signed and their integrity is checked as well.

The integrity of the application components is checked using the integrity_checker utility.

The integrity check utility must be run under the account with root privileges.

To check integrity, you can use either the utility installed with the application or the utility distributed on a certified CD.

It is recommended to run the integrity check utility from a certified CD to ensure integrity of the utility. When running the utility from the CD, specify the full path to the manifest file.

The integrity check utility installed with the application is located at the following paths:

  • To check the application package, graphical user interface package, and the Network Agent: /opt/kaspersky/kesl/bin/integrity_checker.
  • To check Kaspersky Endpoint Security administration plug-in – the directory where the executable modules (DLL) of the administration plug-in are located:
    • C:\Program Files\Kaspersky Lab\Kaspersky Security Center\Plugins\<plug-in version>.linux.plg\integrity_checker.exe – for 32-bit operating systems.
    • C:\Program Files (x86)\Kaspersky Lab\Kaspersky Security Center\Plugins\<plug-in version>.linux.plg\integrity_checker.exe – for 64-bit operating systems.

The manifest files are located at the following paths:

  • /opt/kaspersky/kesl/bin/integrity_check.xml – to check integrity of the application package.
  • /opt/kaspersky/kesl/bin/gui_integrity_check.xml – to check integrity of the graphical user interface package.
  • /opt/kaspersky/klnagent/bin/kl_file_integrity_manifest.xml – to check the Network Agent in 32-bit operating systems.
  • /opt/kaspersky/klnagent64/bin/kl_file_integrity_manifest.xml – to check the Network Agent in 64-bit operating systems.

To check integrity of the application components, run the following command:

  • To check the application package and graphical user interface package:

    integrity_checker [<path to manifest file>] --signature-type kds-with-filename

  • for checking the Kaspersky Endpoint Security administration plug-in and Network Agent:

    integrity_checker [<path to manifest file>]

The default path is for a manifest file located in the same directory as the integrity checker utility.

You can run the utility with the following optional settings:

  • --crl <directory> – path to the directory containing the Certificate Revocation List.
  • --version – display the version of the utility.
  • --verbose – display detailed information about performed actions and their results. If you do not specify this setting, only errors, objects that did not pass the check, and scan statistics summary will be displayed.
  • --trace <file name>, where <file name> is the name of the file where events that happen during scans will be logged at the DEBUG level of detail.
  • --signature-type kds-with-filename – the type of the signature to be checked (this setting is required for checking the application package, graphical user interface package, and Network Agent).
  • --single-file <file> – scan only one file in the manifest; ignore the other objects in the manifest.

You can view description of all available integrity check utility settings in the help on the utility options by running the integrity_checker --help command.

The result of checking the manifest files is displayed as follows:

  • SUCCEEDED — integrity of the files has been confirmed (return code 0).
  • FAILED – integrity of the files has not been confirmed (return code is not 0).

If a violation of the integrity of the application or Network Agent is detected when the application starts, Kaspersky Endpoint Security generates an IntegrityCheckFailed event in the event log and in Kaspersky Security Center.

Page top

[Topic 249621]

Contact Technical Support

If you do not find a solution to your problem in the application documentation or other sources of information about the application, it is recommended to contact Technical Support. Technical Support specialists will answer any of your questions about installing and using Kaspersky Endpoint Security.

Kaspersky provides support for Kaspersky Endpoint Security during its life cycle (see the Application life cycle page). Before contacting Technical Support, please read the support rules.

You can contact Technical Support in one of the following ways:

After you inform Kaspersky Technical Support specialists about the problem, they may ask you to send a trace file or dump file.

Technical Support specialists may also need additionally information about the operating system and running processes on the device, as well as detailed reports on the operation of application components.

While diagnosing the problem, Technical Support specialists may ask you to change the application settings to:

  • activate functionality to receive advanced diagnostic information;
  • perform more detailed configuration of individual application components that cannot be performed through the standard user interface;
  • change settings for storing received diagnostic information;
  • to configure the capture and storage of network traffic in a file.

Technical Support specialists will tell you all the information required to perform these actions (the sequence of steps, the settings to change, configuration files, scripts, advanced command line capabilities, debugging modules, special utilities, etc.), as well as the body of information received for diagnostic purposes. The received advanced diagnostic information is stored on the user device. This information is not automatically sent to Kaspersky.

The steps listed above should be performed only with the guidance of Technical Support specialists based on instructions they provide. Independently changing application files using means not described in the application documentation or not recommended by Technical Support specialists may lead to poor performance and failures in the application and operating system, reduced protection, as well as inaccessible and corrupted data.

In this Help section

Technical Support via Kaspersky CompanyAccount

About trace files

About dump files

Page top

[Topic 68417]

Technical Support via Kaspersky CompanyAccount

Kaspersky CompanyAccount is a portal for companies that use Kaspersky applications. The Kaspersky CompanyAccount portal is designed to facilitate interaction between users and Kaspersky specialists through online requests. The Kaspersky CompanyAccount portal lets you monitor the progress of electronic request processing by Kaspersky specialists and store a history of electronic requests.

You can register all of your organization's employees under a single account on Kaspersky CompanyAccount. A single account lets you centrally manage electronic requests from registered employees to Kaspersky and also manage the privileges of these employees via Kaspersky CompanyAccount.

The Kaspersky CompanyAccount portal is available in the following languages:

  • English
  • Spanish
  • Italian
  • German
  • Polish
  • Portuguese
  • Russian
  • French
  • Japanese

To learn more about Kaspersky CompanyAccount, visit the Technical Support website.

Page top

[Topic 198079]

About trace files

A trace file lets you track the step-by-step execution of application commands and detect the stage at which an application error occurs.

Trace files are stored on the device as long as the application is in use, and are deleted permanently when the application is removed. Trace files are not sent to Kaspersky automatically.

Trace files are saved in a human-readable format. It is recommended to protect information from unauthorized access before sending it to Kaspersky.

By default, trace files are stored in the directory /var/log/kaspersky/kesl/. Root privileges are required to access the default trace files directory.

Contents of trace files

All trace files contain the following general data:

  • Event time.
  • Number of the thread of execution.
  • Application component that caused the event.
  • Degree of event severity (informational event, warning, critical event, error).
  • A description of the event involving command execution by a component of the application and the result of execution of this command.

Trace files may store the following information in addition to general data:

  • The statuses of the application components and their operational data.
  • Data on user activity in the application.
  • Data on the hardware installed on the device.
  • Data about all operating system objects and events, including information about user activity.
  • Data contained in the objects of the operating system (for example, the contents of files that may contain any user personal data).
  • Network traffic data (for example, the contents of the entry fields on a website, which may include bank card information or any other sensitive data).
  • Data received from Kaspersky servers (such as the version of the application databases).

Trace files of administration plug-ins

If you are using the Kaspersky Security Center Administration Console to manage the Kaspersky Endpoint Security application, information about events that occur during operation of the MMC administration plug-in may be logged to a trace file of the Kaspersky Endpoint Security MMC plug-in on the device where the Kaspersky Security Center Administration Server is installed. The file name contains the version number of Kaspersky Endpoint Security, file creation date and time, and process ID (PID). This file contains information about the events that occur during MMC plug-in operation, in particular, about the operation of policies and tasks.

In addition to general data, the trace file may contain the following information:

  • Personal data, including the last name, first name, and middle name, if such data is part of the path to files.
  • The name of the account used to log in to the operating system if the user account name is part of a file name.

By default, trace files of the Kaspersky Endpoint Security MMC plug-in are not created. You can use registry keys to create the MMC plug-in trace file. Contact Technical Support representatives for detailed information on how to create trace files.

All created trace files of the MMC plug-in are located in the folder specified by the user during registry key configuration.

If you use the Kaspersky Security Center Web Console to manage the Kaspersky Endpoint Security application, information about events that occur during operation of the web administration plug-in may be written to the trace files of the web plug-in:

Trace files for the web plug-in are created automatically if logging of Web Console activities is enabled in Web Console Installation Wizard (for more details, refer to the Kaspersky Security Center Help).

Trace files of the web plug-in are stored in the Web Console installation folder in the "logs" subfolder.

Page top

[Topic 198080]

About dump files

A dump file contains all information about the working memory of Kaspersky Endpoint Security processes at the time when the dump file was created. If required, you can enable the creation of dump files when the application crashes.

You can configure the creation of dump files using the kesl.ini configuration file, as well as in the Kaspersky Endpoint Security policy settings using Kaspersky Security Center Administration Console or Kaspersky Security Center Web Console. By default, dump files are stored in the /var/opt/kaspersky/kesl/common/dumps and /var/opt/kaspersky/kesl/common/dumps-user directories. Root privileges are required to access dump files. The maximum number of dump files is limited.

Depending on the operating system settings, user dump files may not be created. Make sure that the system kernel is configured using sysctl kernel.yama.ptrace_scope=0.

Dump files are stored on the computer as long as the application is in use, and are deleted permanently when the application is removed. Dump files are not sent to Kaspersky automatically.

Dump files may contain personal data. It is recommended to protect information from unauthorized access before sending it to Kaspersky.

To enable the creation of dump files using the kesl.ini configuration file:

  1. Stop Kaspersky Endpoint Security.
  2. Open the /var/opt/kaspersky/kesl/common/kesl.ini file for editing.
  3. Add the following setting to the [General] section:

    CoreDumps=yes

  4. Start Kaspersky Endpoint Security.

Page top

[Topic 206054]

Appendix 1. Resource consumption optimization

When scanning objects, Kaspersky Endpoint Security uses CPU resources, disk subsystem input/output, and RAM.

To view the resource consumption by the application, execute the following command:

top -bn1|grep kesl

The command must be executed when the system is loaded.

The command output shows the amount of used memory and processor time:

651 root 20 0 3014172 2.302g 154360 S 120.0 30.0 0:32.80 kesl

Column 6 displays the amount of resident memory – 2.302g.

Column 9 displays the percentage of the processor cores usage – 120.0, where each core is represented by 100 percent. Thus, 120% means that one core is fully used, and the other is used at 20%.

If Kaspersky Endpoint Security critically slows down the system while scanning objects, you must configure the application to optimize system resource utilization.

In this section

Determining the task that consumes resources

Configuring the File Threat Protection task

Configuring the On-demand Scan task

Page top

[Topic 206066]

Determining the task that consumes resources

In order to determine which application tasks are consuming the system resources, it is necessary to distinguish the resource consumption of File Threat Protection tasks (OAS type) and On-demand Scan tasks (ODS and ContainerScan types).

If the application is managed by Kaspersky Security Center policy, it is required to allow local task management for the period of the study.

In this section

File Threat Protection task operation analysis

On-demand Scan tasks operation analysis

Page top

[Topic 248489]

File Threat Protection task operation analysis

To analyze the operation of the File Threat Protection task:

  1. Stop all scan and monitoring tasks.
  2. Make sure that the on-demand scan tasks will not run during the scan or have no schedule. You can do it using Kaspersky Security Center or locally by doing the following steps:
    1. Get the list of all application tasks by executing the following command:

      kesl-control --get-task-list

    2. Get the schedule settings for the Malware Scan task by executing the following command:

      kesl-control --get-schedule <task ID>

      If the command output is RuleType=Manual, the task can only be started manually.

    3. Get the schedule settings for all your Malware Scan tasks, if any, and set them to start manually by executing the following command:

      kesl-control --set-schedule <task ID> RuleType=Manual

  3. Enable generation of application trace files with a high level of details by executing the following command:

    kesl-control --set-app-settings TraceLevel=Detailed

  4. Start the File Threat Protection task if it has not been started by executing the following command:

    kesl-control --start-task 1

  5. Load the system in the mode that caused the performance problems; a few hours is enough.

    While being loaded, the application writes a lot of information to the trace files; however only 5 files of 500 MB are stored by default, so the old information will be overwritten. If the problems with performance and resource consumption stop occurring, then they are most likely caused by on-demand scan tasks and you can proceed to analyzing the operation of ContainerScan and ODS scan tasks.

  6. Disable creation of the application trace files by executing the following command:

    kesl-control --set-app-settings TraceLevel=None

  7. Determine the list of objects that have been scanned the most times by running the following command:

    fgrep 'AVP ENTER' /var/log/kaspersky/kesl/kesl.* | awk '{print $8}' | sort | uniq -c | sort -k1 -n -r|less

    The result is loaded into less, a text viewer utility, where the objects that have been scanned the most times are displayed first.

  8. Determine whether the objects scanned the most number of times are dangerous. In case of any difficulties, contact Technical Support.

    For example, directories and log files can be considered safe if a trusted process writes to them, database files can also be considered safe.

  9. Write down the paths to the objects that are safe, in your opinion; the paths will be required to configure exclusions from the scan scope.
  10. If various services frequently write data to files in the system, such files are scanned again in the pending queue. Determine the list of paths that have been scanned the most times in the pending queue by running the following command:

    fgrep 'SYSCALL' /var/log/kaspersky/kesl/kesl.* | fgrep 'KLIF_ACTION_CLOSE_MODIFY' | awk '{print $9}' | sort | uniq -c | sort -k1 -n -r

    The files that were scanned the most times will appear at the beginning of the list.

  11. If the counter for a file exceeds several thousands in a few hours, you should check whether you can trust this file in order to exclude it from scan.

    The logic of to determine it is the same as for the previous study (see step 8): log files can be considered safe, since they cannot be launched.

  12. Even if some files are excluded from scan by the Real-time protection task, they can still be intercepted by the application. If excluding certain files from Real-time protection does not result in significant increase of performance, you can completely exclude the mount point where these files are located from the interception scope of the application. To do so, do the following:
    1. Run the following command to get the list of files intercepted by the application:

      grep 'FACACHE.*needs' /var/log/kaspersky/kesl/kesl.* | awk '{print $9}' | sort | uniq -c | sort -k1 -n -r

    2. Using this list, determine the paths used for most of the file operation interceptions and configure interception exceptions.
Page top

[Topic 206098]

On-demand Scan tasks operation analysis

Tasks of the ODS and ContainerScan types can also cause significant resource consumption. Follow these recommendations for the tasks of ODS type:

  • Make sure that several on-demand scan tasks are not running at the same time. The application allows for operation in this mode, but resource consumption can significantly increase. Check the schedule of all tasks of the ODS and ContainerScan types locally (as described for the File Threat Protection task) or using Kaspersky Security Center.
  • Run the scan during the minimum server load.
  • Make sure that there are no mounted remote resources (SMB/NFS) at the specified scan path. If a remote resource scan task cannot be performed directly on the server that provides the resource, do not perform the resource scan on servers with critical services, as execution of this task can take a long time (depending on the connection speed and the number of files).
  • Optimize the settings of the on-demand scan task before start.

Page top

[Topic 248490]

Configuring the File Threat Protection task

If, after analysis of the File Threat Protection task's operation, you have created a list of directories and files that can be excluded from the scan scope, you need to add them to the exclusions.

Scan exclusions

To exclude the /tmp/logs directory and all subdirectories and files recursively, execute the following command:

kesl-control --set-settings 1 --add-exclusion /tmp/logs

To exclude a specific file or files by mask in the /tmp/logs directory, execute the following command:

kesl-control --set-settings 1 --add-exclusion /tmp/logs/*.log

To exclude all files with the .log extension in the /tmp/ directory and subdirectories using a recursive mask, execute the following command:

kesl-control --set-settings 1 --add-exclusion /tmp/**/*.log

Interception exclusions

If you want to exclude files in a certain directory not only from scan, but also from interception, you can exclude the entire mount point.

To exclude an entire mount point:

  1. If the directory is not a mount point, create a mount point from it. For example, to create a mount point from the /tmp directory, execute the following command:

    mount --bind /tmp/ /tmp

  2. To keep the mount point after the server reboot, add the following line to the /etc/fstab file:

    /tmp /tmp none defaults,bind 0 0

  3. Add the /tmp directory to the global exceptions by executing the following command:

    kesl-control --set-app-settings ExcludedMountPoint.item_0000=/tmp

  4. If you want to add several directories, increase the item_0000 counter by one (item_0001, item_0002, and so on).

It is also recommended to exclude mount points that are mounted remote resources with unstable or slow connection.

Changing scan type

By default, the File Threat Protection task can scan files when they are opened or closed. If analysis of the File Threats Protection task performance shows that too many files are being written, you can make the task operate only when files are opened by running the following command:

kesl-control --set-set 1 ScanByAccessType=Open

In this operation mode, changes made to the file after it is opened are not scanned until the next opening of the file.

Page top

[Topic 206183]

Configuring the On-demand Scan task

On-demand ODS and ContainerScan tasks are configured in the same way as configuring scan exclusions for the File Threat Protection task. However, the setting for excluding mount points does not apply to on-demand ODS and ContainerScan tasks.

Scan exclusion settings for one scan task do not affect other scan tasks. Exclusions must be configured separately for each scan task.

Setting the memory usage limits when unpacking archives

The on-demand scan task uses RAM to unpack archives when scanning the archives recursively. The application allows adjusting the limit on memory usage while scanning files using the ScanMemoryLimit parameter in the kesl.ini configuration file. The default value is 8192 MB. The minimum value is 2 MB. If the specified value is less than 2 MB, the application uses the minimum value (2 MB). If the specified value is greater than the amount of RAM available in the system, the application uses up to 25% of the RAM. This value cannot be changed.

To specify a limit on memory use when scanning:

  1. Stop Kaspersky Endpoint Security.
  2. Open the /var/opt/kaspersky/kesl/common/kesl.ini file for editing.
  3. Add the ScanMemoryLimit setting with the required value (for example, 8192) to the [General] section:

    ScanMemoryLimit=8192

  4. Start Kaspersky Endpoint Security.

The ScanMemoryLimit setting limits the amount of memory used when scanning files, but not the total amount of memory used by the application. So, the total amount of memory can be greater than the value specified by this setting.

Page top

[Topic 247007]

Application settings configuration files

After the initial setup, the application creates the following configuration files:

  • /var/opt/kaspersky/kesl/common/agreements.ini

    The agreements.ini configuration file contains settings related to the License Agreement, Privacy Policy, and Kaspersky Security Network Statement.

  • /var/opt/kaspersky/kesl/common/kesl.ini

    The kesl.ini configuration file contains the settings described in the following table.

If necessary, you can edit the values of the settings in these files.

The default values in these files should be changed only under the supervision of Technical Support specialists and in accordance with their instructions.

Settings of the kesl.ini configuration file

Setting

Description

Values

The [General] section contains the following settings:

ScanMemoryLimit

Limit on the application's use of memory in megabytes.

Default value: 8192.

ExecArgMax

Number of arguments that the application captures from the exec call.

Default value: 50.

RevealSensitiveInfoInTraces

Display information in trace files that may contain personal data (for example, passwords).

true/yes (default value) — display information in application trace files that may contain personal data.

false/no (default value) — do not display information that may contain personal data in trace files.

PackageType

Format of the installed application package.

This setting does not affect the operation of the application. The value of the setting is filled in automatically during initial application configuration.

rpm – an RPM package is installed.

deb – a DEB package is installed.

 

Locale

The locale used for the application events sent to Kaspersky Security Center.

The locale of the graphical interface and the application command line depends on the value of the LANG environment variable. If the locale that is not supported by Kaspersky Endpoint Security is specified as the value of the LANG environment variable, the graphical interface and the command line are displayed in English.

The locale in the format specified by RFC 3066.

If the Locale setting is not specified, the operating system locale is used. If the application fails to determine the operating system localization language or the operating system localization is not supported, the default value will be used – en_US.utf8.

UseFanotify

Indicates use of fanotify notifications.

This setting does not affect the operation of the application. The value of the setting is filled in automatically during initial application configuration.

true/yes – The operating system supports fanotify notifications.

false/no – The operating system does not support fanotify notifications.

CoreDumps

Enables the creation of a dump file when application failure occurs.

true/yes – Create a dump file when the application crashes.

false/no (default value) – Do not create a dump file when the application crashes.

CoreDumpsPath

Path to the directory where the dump files are stored.

Default value: /var/opt/kaspersky/kesl/common/dumps.

Root privileges are required to access the default dump file directory.

MinFreeDiskSpace

The minimum amount of disk memory that will remain after writing a dump file, in megabytes.

Default value: 300.

MachineId

The user's unique device ID.

The value of the setting is filled in automatically during installation of the application.

SocketPath

Path to a socket for a remote connection to, say, a graphical interface and the kesl-control utility.

Default value: /var/run/bl4control.

KsvlaMode

Kaspersky Endpoint Security usage mode.

This setting does not affect the operation of the application. The value of the setting is filled in automatically during initial application configuration.

true/yes – the application is used in Light Agent mode to protect virtual environments.

false/no – the application is used in standalone mode.

StartupTraces

Enables generation of trace files at application startup.

true/yes – Create trace files at application startup.

false/no (default value) – Do not create trace files at application startup.

MaxInotifyWatches

Limit on the number of subscriptions to changes in files and directories (user watches) in /proc/sys/fs/inotify/max_user_watches.

Default value: 300000.

MaxInotifyInstances

Limit on the number of subscriptions to changes in files and directories for a single user.

Default value: 2048.

ExecEnvMax

The number of environment variables that the application captures from the command call.

Default value: 50.

AdditionalDNSLookup

Indicates use of a public DNS.

If there are errors accessing servers through the system DNS, the application uses a public DNS. This is needed for updating application databases and maintaining device security. The application will use the following public DNSes in this order:

  • Google Public DNS (8.8.8.8).
  • Cloudflare DNS (1.1.1.1).
  • Alibaba Cloud DNS (223.6.6.6).
  • Quad9 DNS (9.9.9.9).
  • CleanBrowsing (185.228.168.168).

The application's requests may contain domain addresses and the user's external IP address, since the application establishes a TCP/UDP connection with the DNS server. This information is necessary, for example, to check the certificate of a web resource when interacting via HTTPS. If the application is using a public DNS server, data processing rules are governed by the Privacy Policy of the corresponding service. If you need to block the application from using a public DNS server, contact Technical Support for a private patch.

true/yes – Use a public DNS to access Kaspersky servers.

false/no (default value) – Do not use a public DNS to access Kaspersky servers.

The [Network] section contains the following settings:

WtpFwMark

A mark in the iptables rules for forwarding traffic to the application for processing by Web Threat Protection tasks. You may need to change this mark if a device with the application runs other software that uses the ninth bit of the TCP packet mask, and a conflict occurs.

A decimal value or hexadecimal number with the prefix 0x.

Default value: 0x100.

NtpFwMark

A mark in the iptables rules for forwarding traffic to the application for processing by Network Threat Protection tasks.

You may need to change this mark if a device with the application runs other software that uses the ninth bit of the TCP packet mask, and a conflict occurs.

A decimal value or hexadecimal number with the prefix 0x.

Default value: 0x200.

BypassFwMark

A mark used to indicate packets created or scanned by the application, so that the application does not scan them again.

A decimal value or hexadecimal number with the prefix 0x.

Default value: 0x400.

BypassNFlogMark

A mark used to indicate packages created or scanned by the application to prevent them from being logged by the iptable utility.

A decimal value or hexadecimal number with the prefix 0x.

Default value: 0x800.

ProxyRouteTable

Number of the routing table.

Default value: 101.

The [Virtualization] section contains the following settings:

ServerMode

The role of the protected virtual machine on which Kaspersky Endpoint Security is used in Light Agent mode to protect virtual environments: server or workstation.

This setting does not affect the operation of the application. The value of the setting is filled in automatically during initial application configuration.

true/yes – the protected virtual machine is used as a server.

false/no – the protected virtual machine is used as a workstation.

VdiMode

Enables VDI protection mode when using the application in Light Agent mode to protect virtual environments.

This setting does not affect the operation of the application. The value of the setting is filled in automatically during initial application configuration.

true/yes – VDI protection mode is enabled.

false/no – VDI protection mode is disabled.

The [Watchdog] section contains the following settings:

TimeoutAfterHeadshot

Maximum time to wait for the controlled process to complete from the moment the Watchdog server sends the HEADSHOT signal to the controlled process.

Default value: 2 minutes.

 

StartupTimeout

Maximum time interval from the moment the REGISTER message is received to the moment the SUCCESSFUL_STARTUP message is received.

Default value: 3 minutes.

TimeoutAfterKill

 

Maximum time to wait for the controlled process to complete from the moment the Watchdog server sends the SIGKILL signal to the controlled process.

If the controlled process does not finish before this time elapses, the action specified by the --failed-kill setting is performed.

Default value: 2 days.

PingInterval

The interval with which the application attempts to send a PONG message to a server in response to a received PING message.

Default value: 2000 ms.

MaxRestartCount

 

Maximum number of consecutive unsuccessful attempts to start the application.

Default value: 5.

ActivityTimeout

 

Maximum time interval during which the application should send a message to the Watchdog server.

If a message is not received from the application within this time interval, the Watchdog server begins the procedure to terminate the controlled process.

Default value: 2 minutes.

ConnectTimeout

 

Maximum time from the start of the controlled process to the moment when a connection with the Watchdog server is established by the application.

If the application does not establish a connection in this time interval, the Watchdog server begins the procedure to terminate the controlled process.

Default value: 3 minutes.

RegisterTimeout

Maximum time from the moment the application connects to the Watchdog server to the moment the server receives a REGISTER message.

Default value: 500 ms.

TimeoutAfterShutdown

 

Maximum time to wait for the controlled process to complete from the moment the Watchdog server sends the SHUTDOWN signal to the controlled process.

Default value: 2 minutes.

MaxVirtualMemory

 

Limit on the use of virtual memory by the controlled process.

If the controlled process uses more virtual memory than this limit, the Watchdog server begins the procedure to terminate the controlled process.

off (default value) – The virtual memory size is not limited.

<value>MB – a value in megabytes.

MaxSwapMemory

 

Limit on the size of the swap file of the controlled process.

If the swap file of the controlled process exceeds this limit, the Watchdog server begins the procedure to terminate the controlled process.

off (default value) – The size of the swap file is not limited.

<value >% – a value between 0 and 100, expressing a percentage of memory.

<value>MB – a value in megabytes.

lowest/<value>%/<value>MB – the smaller value between the value as a percentage and the value in megabytes.

highest/<value>%/<value>MB– the larger value between the value as a percentage and the value in megabytes.

MaxMemory

 

Limit on the resident set size for the controlled process.

If the resident set size of the controlled process exceeds this limit, the Watchdog server begins the procedure to terminate the controlled process.

off – the resident set size is not limited.

<value >% – a value between 0 and 100, expressing a percentage of memory.

<value>MB – a value in megabytes.

lowest/<value>%/<value>MB – the smaller value between the value as a percentage and the value in megabytes.

highest/<value>%/<value>MB – the larger value between the value as a percentage and the value in megabytes.

auto – up to 50% of available memory, but not less than 2GB and not more than 16GB.

Default value: auto.

Page top

[Topic 201432]

Rules for editing application task configuration files

When editing a configuration file, adhere to the following rules:

  • Specify all mandatory settings in the configuration file. You can specify individual task settings without a file using the command line.
  • If a setting belongs to a certain section, specify it only in this section. You can specify the settings in any order within the one section.
  • Enclose the names of sections in square brackets [ ].
  • Enter the values of settings in the format <setting name>=<setting value> (spaces between the a setting name and its value are not processed).

    Example:

    [ScanScope.item_0000]

    AreaDesc=Home

    AreaMask.item_0000=*doc

    Path=/home

    Space and tab characters are ignored before the first quotation mark and after the last quotation mark of a string value, and at the beginning and end of a string value that is not enclosed in quotation marks.

  • If you need to specify several values for a setting, repeat the setting the same number of times as the number of values that you want to specify.

    Example:

    AreaMask.item_0000=*xml

    AreaMask.item_0001=*doc

  • Be case-sensitive when entering values for the following types of settings:
    • Names (masks) of scanned objects and excluded objects.
    • Names (masks) of threats.

    The remaining setting values are not case-sensitive.

  • Specify Boolean setting values as follows: Yes / No.
  • Use quotation marks to enclose string values containing a space character (for example, names of files and directories and their paths, expressions containing the date and time in the format "YYYY-MM-DD HH:MM:SS").

    You can enter the remaining values with or without quotation marks.

    Example:

    AreaDesc="Scanning of email databases"

    A single quotation mark in the beginning or end of a string is considered an error.

Page top

[Topic 201430]

File Threat Protection task configuration file

ScanArchived=No

ScanSfxArchived=No

ScanMailBases=No

ScanPlainMail=No

SkipPlainTextFiles=No

TimeLimit=60

SizeLimit=0

FirstAction=Recommended

SecondAction=Block

UseExcludeMasks=No

UseExcludeThreats=No

ReportCleanObjects=No

ReportPackedObjects=No

ReportUnprocessedObjects=No

UseAnalyzer=Yes

HeuristicLevel=Recommended

UseIChecker=Yes

ScanByAccessType=SmartCheck

[ScanScope.item_0000]

AreaDesc=All objects

UseScanArea=Yes

Path=/

AreaMask.item_0000=*

Page top

[Topic 246946]

Configuration file for the Malware Scan task

ScanFiles=Yes

ScanBootSectors=Yes

ScanComputerMemory=Yes

ScanStartupObjects=Yes

ScanArchived=Yes

ScanSfxArchived=Yes

ScanMailBases=No

ScanPlainMail=No

TimeLimit=0

SizeLimit=0

FirstAction=Recommended

SecondAction=Skip

UseExcludeMasks=No

UseExcludeThreats=No

ReportCleanObjects=No

ReportPackedObjects=No

ReportUnprocessedObjects=No

UseAnalyzer=Yes

HeuristicLevel=Recommended

UseIChecker=Yes

DeviceNameMasks.item_0000=/**

[ScanScope.item_0000]

AreaDesc=All objects

UseScanArea=Yes

Path=/

AreaMask.item_0000=*

Page top

[Topic 198085]

Custom Scan task configuration file

ScanFiles=Yes

ScanBootSectors=No

ScanComputerMemory=No

ScanStartupObjects=No

ScanArchived=Yes

ScanSfxArchived=Yes

ScanMailBases=No

ScanPlainMail=No

TimeLimit=0

SizeLimit=0

FirstAction=Recommended

SecondAction=Skip

UseExcludeMasks=No

UseExcludeThreats=No

ReportCleanObjects=No

ReportPackedObjects=No

ReportUnprocessedObjects=No

UseAnalyzer=Yes

HeuristicLevel=Recommended

UseIChecker=Yes

DeviceNameMasks.item_0000=/**

[ScanScope.item_0000]

AreaDesc=All objects

UseScanArea=Yes

Path=/

AreaMask.item_0000=*

Page top

[Topic 198086]

Critical Areas Scan task configuration file

ScanFiles=No

ScanBootSectors=Yes

ScanComputerMemory=Yes

ScanStartupObjects=Yes

ScanArchived=Yes

ScanSfxArchived=Yes

ScanMailBases=No

ScanPlainMail=No

TimeLimit=0

SizeLimit=0

FirstAction=Recommended

SecondAction=Skip

UseExcludeMasks=No

UseExcludeThreats=No

ReportCleanObjects=No

ReportPackedObjects=No

ReportUnprocessedObjects=No

UseAnalyzer=Yes

HeuristicLevel=Recommended

UseIChecker=Yes

DeviceNameMasks.item_0000=/**

[ScanScope.item_0000]

AreaDesc=All objects

UseScanArea=Yes

Path=/

AreaMask.item_0000=*

Page top

[Topic 198088]

Update task configuration file

SourceType="KLServers"

UseKLServersWhenUnavailable=Yes

ApplicationUpdateMode=DownloadOnly

ConnectionTimeout=10

Page top

[Topic 198089]

Storage management task configuration file

DaysToLive=90

BackupSizeLimit=0

BackupFolder=/var/opt/kaspersky/kesl/common/objects-backup/

Page top

[Topic 198091]

System Integrity Monitoring task configuration file

UseExcludeMasks=No

[ScanScope.item_0000]

AreaDesc=Kaspersky internal objects

UseScanArea=Yes

Path=/opt/kaspersky/kesl/

AreaMask.item_0000=*

Page top

[Topic 198090]

Firewall Management task configuration file

DefaultIncomingAction=Allow

DefaultIncomingPacketAction=Allow

OpenNagentPorts=Yes

[NetworkZonesTrusted]

[NetworkZonesLocal]

[NetworkZonesPublic]

Page top

[Topic 198092]

Anti-Cryptor task configuration file

UseHostBlocker=Yes

BlockTime=30

UseExcludeMasks=No

[ScanScope.item_0000]

AreaDesc=All shared directories

UseScanArea=Yes

Path=AllShared

AreaMask.item_0000=*

Page top

[Topic 198093]

Web Threat Protection task configuration file

UseTrustedAddresses=Yes

ActionOnDetect=Block

CheckMalicious=Yes

CheckPhishing=Yes

UseHeuristicForPhishing=Yes

CheckAdware=No

CheckOther=No

Page top

[Topic 233812]

Device Control task configuration file

RulesAction=ApplyRules

[DeviceClass]

HardDrive=DependsOnBus

RemovableDrive=DependsOnBus

Printer=DependsOnBus

FloppyDrive=DependsOnBus

OpticalDrive=DependsOnBus

Modem=DependsOnBus

TapeDrive=DependsOnBus

MultifuncDevice=DependsOnBus

SmartCardReader=DependsOnBus

PortableDevice=DependsOnBus

WiFiAdapter=DependsOnBus

NetworkAdapter=DependsOnBus

BluetoothDevice=DependsOnBus

ImagingDevice=DependsOnBus

SerialPortDevice=DependsOnBus

ParallelPortDevice=DependsOnBus

InputDevice=DependsOnBus

SoundAdapter=DependsOnBus

[DeviceBus]

USB=Allow

FireWire=Allow

[Schedules.item_0000]

ScheduleName=Default

DaysHours=All

[HardDrivePrincipals.item_0000]

Principal=\Everyone

[HardDrivePrincipals.item_0000.AccessRules.item_0000]

UseRule=Yes

ScheduleName=Default

Access=Allow

[RemovableDrivePrincipals.item_0000]

Principal=\Everyone

[RemovableDrivePrincipals.item_0000.AccessRules.item_0000]

UseRule=Yes

ScheduleName=Default

Access=Allow

[FloppyDrivePrincipals.item_0000]

Principal=\Everyone

[FloppyDrivePrincipals.item_0000.AccessRules.item_0000]

UseRule=Yes

ScheduleName=Default

Access=Allow

[OpticalDrivePrincipals.item_0000]

Principal=\Everyone

[OpticalDrivePrincipals.item_0000.AccessRules.item_0000]

UseRule=Yes

ScheduleName=Default

Access=Allow

Page top

[Topic 198095]

Removable Drives Scan task configuration file

ScanRemovableDrives=NoScan

ScanOpticalDrives=NoScan

BlockDuringScan=No

Page top

[Topic 198119]

Network Threat Protection task configuration file

ActionOnDetect=Block

BlockAttackingHosts=Yes

BlockDurationMinutes=60

UseExcludeIPs=No

Page top

[Topic 198097]

Container Scan task configuration file

ScanArchived=Yes

ScanSfxArchived=Yes

ScanMailBases=No

ScanPlainMail=No

TimeLimit=0

SizeLimit=0

FirstAction=Recommended

SecondAction=Skip

UseExcludeMasks=No

UseExcludeThreats=No

ReportCleanObjects=No

ReportPackedObjects=No

ReportUnprocessedObjects=No

UseAnalyzer=Yes

HeuristicLevel=Recommended

UseIChecker=Yes

ScanContainers=Yes

ContainerNameMask=*

ScanImages=Yes

ImageNameMask=*

DeepScan=No

ContainerScanAction=StopContainerIfFailed

ImageAction=Skip

You can also use the settings in this configuration file for the Custom Container Scan task.

Page top

[Topic 234862]

Behavior Detection task configuration file

UseTrustedPrograms=No

TaskMode=Block

Page top

[Topic 246944]

Application Control task configuration file

AppControlMode=DenyList

AppControlRulesAction=ApplyRules

Page top

[Topic 198087]

Inventory Scan task configuration file

ScanScripts=Yes

ScanBinaries=Yes

ScanAllExecutable=Yes

CreateGoldenImage=No

[ScanScope.item_0000]

AreaDesc=All objects

UseScanArea=Yes

Path=/usr/bin

AreaMask.item_0000=*

Page top

[Topic 221114]

Kaspersky Endpoint Detection and Response (KATA) Integration task configuration file

UseClientPinnedCertificate=No

SynchronizationPeriod=5

ConnectionTimeout=10

RequestTimeout=10

EnableTelemetry=Yes

[Endpoints.item_0000]

Address=

Port=443

[EventTransferSettings]

MaximumDataTransferTime=30

UseRequestCountLimits=Yes

MaximumNumberOfEventsInHour=3000

EventLimitExceededPercentage=15

Page top

[Topic 245132]

Appendix 3. Command line return codes

Kaspersky Endpoint Security has the following command line return codes:

0 – command/task completed successfully.

1 – general error in command arguments.

2 means error in passed application settings.

64 means Kaspersky Endpoint Security is not running.

66 – application databases are not downloaded (used only by the kesl-control --app-info command).

67 means activation 2.0 ended with an error due to network problems.

68 – the command cannot be executed because the application is running under a policy.

69 – the application is located in the Amazon Paid Ami infrastructure.

70 – an attempt to start a running task, delete a running task, change the settings of a running task, stop a stopped task, pause a suspended task, or resume a running task.

71 – Kaspersky Security Network Statement has not been accepted.

72 – threats were detected during execution of the Custom Scan or Custom Container Scan task.

73 – an attempt to specify the Application Control task settings that affect the application operation without confirming these settings using the --accept flag.

74 means Kaspersky Endpoint Security must be restarted after an update.

75 means the device must be restarted.

76 — connection prohibited, as only users with root rights should have write access to the specified path.

77 — the specified license key is already in use on the device.

128 – unknown error.

65 – all other errors.

Page top

[Topic 213875]

Scan request

Purpose

Scan of the object specified in the request body.

The following objects can be scanned:

Path

http://<server>:<port>/scans[?wait=1]

Settings

The optional wait setting specifies the type of the scan session.

If the setting value is 1, synchronous scan is performed and the application sends a report when scan finishes.

If the setting value is 0, asynchronous scan is performed, and the response is as follows:

{

"id"="7d27e9b4-a4d7-469b-bdcf-ebfe953498e4",

"location"="/scans/7d27e9b4-a4d7-469b-bdcf-ebfe953498e4"

}

where:

  • id – unique identifier of the scan session.
  • location – path for requesting information on this section: http://<server>:<port>/scans/<location>.

Request headers

The request can contain the following headers:

  • Content-Type

    Defines the type of the object submitted for scan.

    Supported values:

    • application/octet-stream – one file
    • multipart/form-data – multiple files
    • text/plain – one or multiple Docker images located in a specific repository
    • application/json – one or multiple Docker images located in a specific repository with additional settings
  • x-api-key (optional)

    API key specified in the KRAS4D_XAPIKEY environment variable or the xapikey variable in the configuration file.

Possible errors

If an unsupported value is specified in the Content-Type header, the application returns the following error:

{

"error"={

"code"="NOT_SUPPORTED_CONTENT_TYPE",

"details"="<content type>",

"message"="Not supported Content-Type"

},

"status"="error"

}

In this section

Scan file request

Request to scan multiple files

Request to scan Docker images

Request to scan Docker images with additional settings

Page top

[Topic 213876]

Scan file request

Content-Type

application/octet-stream

Request body

File.

Response example:

{

"completed": "Mon, 01 Mar 2021 06:54:39 GMT",

"created": "Mon, 01 Mar 2021 06:54:38 GMT",

"progress": 100,

"scan_result": {

"noname": {

"started": "2021-03-01 06:54:39",

"stopped": "2021-03-01 06:54:39",

"threats": [

{

"name": "EICAR-Test-File",

"object": "/root/kesl-service/tmp/b8eb4128-8cb4-4964-87cf-b9853e6544ec"

}

],

"verdict": "infected"

}

},

"status": "completed",

"verdicts": [

"infected"

]

}

Page top

[Topic 213878]

Request to scan multiple files

Content-Type

multipart/form-data

Request body

Multiple files.

Response example:

{

"completed": "Mon, 01 Mar 2021 06:55:44 GMT",

"created": "Mon, 01 Mar 2021 06:55:43 GMT",

"progress": 100,

"scan_result": {

"clean": {

"started": "2021-03-01 06:55:43",

"stopped": "2021-03-01 06:55:43",

"verdict": "clean"

},

"corrupted.com": {

"errors": [

{

"error": "Corrupted object",

"object": "/root/kesl-service/tmp/75d28fe6-8154-4361-9382-90a76861518a"

}

],

"started": "2021-03-01 06:55:43",

"stopped": "2021-03-01 06:55:43",

"verdict": "non scanned"

},

"error.com": {

"errors": [

{

"error": "read error",

"object": "/root/kesl-service/tmp/37f6e0dd-13f9-4d11-899c-5fe0f23e407d"

}

],

"started": "2021-03-01 06:55:44",

"stopped": "2021-03-01 06:55:44",

"verdict": "non scanned"

},

"infected.com": {

"started": "2021-03-01 06:55:44",

"stopped": "2021-03-01 06:55:44",

"threats": [

{

"name": "EICAR-Test-File",

"object": "/root/kesl-service/tmp/7d664646-bf56-4060-b958-5ce9e746c929"

}

],

"verdict": "infected"

}

},

"status": "completed",

"verdicts": [

"clean",

"non scanned",

"infected"

]

}

Page top

[Topic 213879]

Request to scan Docker images

Content-Type

text/plain

Request body

Link to the Docker images to scan.

The following values are available:

  • Path to an image in the repository (for example, https://index.docker.io/jerbi/eicar:latest).
  • Path mask for multiple images (for example, https://index.docker.io/<name mask>:<tag mask>). You can use the ? and * characters to specify a mask.

Response example:

{

"completed": "Sun, 31 Jan 2021 10:29:26 GMT",

"created": "Sun, 31 Jan 2021 10:29:20 GMT",

"progress": 100,

"scan_result": {

"jerbi/eicar:latest": {

"started": "2021-01-31 10:29:25",

"stopped": "2021-01-31 10:29:26",

"threats": [

{

"name": "EICAR-Test-File",

"object": "[image:docker.io/jerbi/eicar:latest] /eicar.com.txt"

}

],

"verdict": "infected"

}

},

"status": "completed",

"verdicts": [

"infected"

]

}

Possible errors

A request using the Docker REST API is used to get a list of images by mask.

However, on many public servers it is disabled for security reasons. An attempt to scan images by mask on such servers results in an error.

Error example:

{

"completed": "Mon, 01 Mar 2021 07:02:24 GMT",

"created": "Mon, 01 Mar 2021 07:02:22 GMT",

"scan_errors": [

{

"code": 401,

"details": {

"context": {

"image_mask": "/jerbi/eic*:latest",

"repository": "index.docker.io",

"repository_base": "index.docker.io"

},

"errors": [

"Unauthorized"

]

},

"message": "Invalid source"

},

[

"Unauthorized"

]

],

"status": "completed"

}

Page top

[Topic 213880]

Request to scan Docker images with additional settings

Content-Type

application/json

Request body

JSON of the following type:

{

"source": "https://index.docker.io/jerbi/eicar:latest",

"params": {

"destination": "https://fake",

"skipimageifexists": true,

"custom_callbacks": {

"on_detect": {

"uri": "http://10.16.42.75:5050",

"content-type": "application/json",

"body": {

"session_id": "100",

"session_init": "20201105T072403+0300",

"infected_items": "$infected"

}

},

"on_complete": {

"body": {

"session_id": "100",

},

"uri": "http://10.16.42.75:5050/on_complete",

}

}

}

}

Additional request settings

The params section can contain the following settings:

  • destination (optional) – the server to which the scanned image will be copied.
  • skipimageifexists (optional) – do not scan or copy the image if the destination server already has an image with the same name and SHA256 hash. This setting can only be specified if the destination setting is specified.
  • custom_callbacks (optional) – describes the requests that should be sent when scan finishes:
    • on_detect – the request is sent if a threat is detected.
    • on_complete – the request is always sent when scan finishes.

In the description of the request body, you can specify the $infected substitution variable. The list of infected objects is substituted instead of this variable.

Response example:

{

"completed": "Mon, 01 Mar 2021 07:13:49 GMT",

"created": "Mon, 01 Mar 2021 07:13:42 GMT",

"progress": 100,

"scan_errors": [

{

"code": 500,

"message": "Unable to get images hash from destination registry"

}

],

"scan_params": {

"destination": "https://fake",

"skipimageifexists": true

},

"scan_result": {

"jerbi/eicar:latest": {

"started": "2021-03-01 07:13:48",

"stopped": "2021-03-01 07:13:49",

"threats": [

{

"name": "EICAR-Test-File",

"object": "[image:docker.io/jerbi/eicar:latest] /eicar.com.txt"

}

],

"verdict": "infected"

}

},

"status": "completed",

"verdicts": [

"infected"

]

}

Page top

[Topic 213884]

Request for information on scan sessions (GET)

Purpose

Obtaining information about the scan sessions.

Path

http://<server>:<port>/scans[?force] – request for a list of sessions.

http://<server>:<port>/scans/<unique scan session identifier>[?force] – request for information on a specific session.

Settings

The KESL container stores data about scan sessions in the memory and writes them to the scan results database.

The optional ?force setting initiates reading information from the database if several KESL container instances are working with the same database. If this setting is missing, information will be displayed only about the sessions that were initiated by a specific KESL container instance.

In this section

Request for the list of scan sessions

Request for information on a specific session

Page top

[Topic 213889]

Request for the list of scan sessions

Path

http://<server>:<port>/scans[?force]

Response example:

{

"629ae0a9-28de-4e2f-b130-67e87ba4d61d": {

"progress": 100,

"status": "completed"

},

"655b96fc-34ca-4915-9c41-d52724a277de": {

"progress": 100,

"status": "completed"

},

"7d27e9b4-a4d7-469b-bdcf-ebfe953498e4": {

"progress": 100,

"status": "completed"

},

"c32ca88f-2d24-47ec-b040-0540366bea4b": {

"progress": 100,

"status": "completed"

},

"df11ad81-26aa-42f9-94bb-39dee4304807": {

"progress": 0,

"status": "completed"

},

"fa25340f-4898-497f-ab59-8df494f4ea47": {

"progress": 100,

"status": "completed"

}

}

Page top

[Topic 213891]

Request for information on a specific session

Path

http://<server>:<port>/scans/<unique scan session identifier>[?force]

Response example:

{

"completed": "Mon, 01 Mar 2021 06:45:19 GMT",

"created": "Mon, 01 Mar 2021 06:45:19 GMT",

"progress": 100,

"scan_result": {

"noname": {

"started": "2021-03-01 06:45:19",

"stopped": "2021-03-01 06:45:19",

"threats": [

{

"name": "EICAR-Test-File",

"object": "/root/kesl-service/tmp/65b55d89-b758-4609-a2f3-f63ef839815d"

}

],

"verdict": "infected"

}

},

"status": "completed",

"verdicts": [

"infected"

]

}

Page top

[Topic 214105]

Request for adding a registry certificate (POST)

Purpose

Adding a registry certificate without reloading the KESL container.

Path

http://<server>:<port>/addcert

Request headers

The request contains a Content-Type header.

Supported values:

  • application/octet-stream – one certificate file
  • multipart/form-data – multiple certificate files
Page top

[Topic 256753]

Request for information about the state of a KESL container (GET)

Purpose

Obtaining information about the current state of a KESL container and the application status parameters that determine the state of the KESL container (the status of the application, license, and databases).

Path

http://<server>:<port>/status

Response example:

{'product info': {'databases_date': '<database release date>', 'databases_loaded': True, 'license_expiration': '<license expiration date>', 'license_info': 'The key is valid', 'policy': 'Not applied', 'version': '<application version>'}, 'status': 'service available'}

Possible errors

An example of an error (the application is not running in the KESL container):

{'product info': {'databases_date': 'N/A', 'databases_loaded': False, 'license_expiration': 'N/A', 'license_info': 'N/A', 'policy': 'N/A', 'version': 'N/A'}, 'status': 'service not available', 'status_reason': ['KESL not response']}{'product info': {'databases_date': 'N/A', 'databases_loaded': False, 'license_expiration': 'N/A', 'license_info': 'N/A', 'policy': 'N/A', 'version': 'N/A'}, 'status': 'service not available', 'status_reason': ['KESL not response']}{'product info': {'databases_date': 'N/A', 'databases_loaded': False, 'license_expiration': 'N/A', 'license_info': 'N/A', 'policy': 'N/A', 'version': 'N/A'}, 'status': 'service not available', 'status_reason': ['KESL not response']}

Example of an error (application databases were not downloaded):

{'product info': {'databases_date': 'N/A', 'databases_loaded': False, 'license_expiration': '<license expiration date>', 'license_info': 'Inconsistent update', 'policy': 'Not applied', 'version': '<application version>'}, 'status': 'service not available', 'status_reason': ['Databases not loaded', 'License error: Inconsistent update']}

Example of an error (the license has expired):

{'product info': {'databases_date': '<database release date>', 'databases_loaded': True, 'license_expiration': '<license expiration date>', 'license_info': 'Expired', 'policy': 'Not applied', 'version': '<kesl version>'}, 'status': 'service not available', 'status_reason': ['License error: Expired']}

Page top

[Topic 198098]

Appendix 5. Configuring interaction with Kaspersky Anti-Virus for Linux Mail Server

To configure joint operation of Kaspersky Endpoint Security and Kaspersky Anti-Virus for Linux Mail Server:

  1. Save the File Threat Protection task settings in the configuration file using the following command:

    kesl-control --get-settings 1 --file <full path to file>

  2. Open the created configuration file for editing.
  3. Add the following section to the created file:

    [ExcludedFromScanScope.item_<item number>]

    Path=/var/opt/kaspersky/klms

  4. Repeat the section specified above for all mail agents integrated with Kaspersky Anti-Virus for Linux Mail Server.
  5. To exclude the temporary directory of filters and services of Kaspersky Anti-Virus for Linux Mail Server from scanning, add the following section to the created file:

    [ExcludedFromScanScope.item_<item number>]

    Path=/tmp/klmstmp

  6. Save the changes in the configuration file.
  7. Import settings from the configuration file to the File Threat Protection task by using the following command:

    kesl-control --set-settings 1 --file <full path to file>

Page top

[Topic 264005]

Sources of information about Kaspersky Endpoint Security

Kaspersky Endpoint Security page in the Knowledge Base

The Knowledge Base is a section of the Kaspersky Technical Support website.

On the Kaspersky Endpoint Security page in the Knowledge Base, you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky Endpoint Security as well as to other Kaspersky applications. Articles in the Knowledge Base may also contain Technical Support news.

Discuss Kaspersky applications on the forum

If your question does not require an immediate answer, you can discuss it with Kaspersky experts and other users on the Forum.

The Forum lets you view discussion topics, post comments, and create new discussion topics.

Page top

[Topic 90]

Glossary

Active key

A key that is currently used by the application.

Active policy

Policy currently used by the application to control data leaks. The application can use several policies at the same time.

Administration group

A set of devices combined in Kaspersky Security Center in accordance with the functions they perform and the set of Kaspersky applications installed on them. Devices are grouped to simplify administration as the group of devices can be managed as a single entity. An administration group can include other groups. For each application installed in the administration group, group policies and group tasks can be created.

Administration Server

A component of Kaspersky Security Center that centrally stores information about all Kaspersky applications installed within the corporate network. It can also be used to manage these applications.

Application activation

Switching the application to the fully functional mode. Application activation is performed during or after the installation of the application. You need an activation code or a key file to activate the application.

Application databases

Databases that contain information about computer security threats known to Kaspersky as of when the databases are released. Application databases are created by Kaspersky experts and updated hourly.

Application settings

Application settings that are common to all types of tasks and govern the overall operation of the application, such as application performance settings, reporting settings, and backup settings.

Database of malicious web addresses

A list of web resources whose content may be considered as dangerous. The list is created by Kaspersky experts; it is regularly updated and is included in the distribution kit of Kaspersky applications.

Database of phishing web addresses

A list of web resource addresses that are identified by Kaspersky experts as phishing. The database is regularly updated and is included in the distribution kit of Kaspersky applications.

Exclusion

Exclusion is an object excluded from the Kaspersky application scan. You can exclude from scan files of certain formats, file masks, a certain area (for example, a folder or an application), application processes, or objects by name, according to the Virus Encyclopedia classification. Each task can be assigned a set of exclusions.

False positive

A situation when a Kaspersky application considers a non-infected object to be infected because the object's code is similar to that of a virus.

File mask

Representation of a file name using wildcards. The standard wildcards used in file masks are * and ?, where * is any number of any characters, and ? is any single character.

Group policy

see Policy.

Group task

A task assigned to an administration group and performed on all managed devices included in this administration group.

Infected object

An object which includes a portion of code that completely matches the part of a known malware code. Kaspersky experts do not recommend accessing such objects.

Integration Server

Kaspersky Endpoint Security for Virtualization Light Agent component. Interacts between Kaspersky Endpoint Security components and the virtual infrastructure.

Kaspersky update servers

Kaspersky HTTP and FTP servers from which Kaspersky applications download database and application module updates.

License

A time-limited right to use the application, granted under the End User License Agreement.

License certificate

A document that you receive from Kaspersky along with the key file or activation code. This document contains information about the license provided.

Light Agent

Kaspersky Endpoint Security for Virtualization Light Agent component. Installed on each virtual machine that needs to be protected.

Object disinfection

A method of processing infected objects that results in full or partial recovery of data. Not all infected objects can be disinfected.

Policy

A policy determines the application settings and manages the access to configuration of an application installed on devices within an administration group. An individual policy must be created for each application. You can create an unlimited number of various policies for applications installed on the devices in each administration group, but only one policy can be applied to each application at a time within an administration group.

Proxy server

A computer network service which allows users to make indirect requests to other network services. First, a user connects to a proxy server and requests a resource (e.g., a file) located on another server. Then the proxy server either connects to the specified server and obtains the resource from it or returns the resource from its own cache (if the proxy has its own cache). In some cases, a user's request or a server's response can be modified by the proxy server for certain purposes.

Reserve key

A key that certifies the right to use the application but is not currently being used.

Startup objects

A set of applications needed for the operating system and software that is installed on the computer to start and operate correctly. These objects are executed every time the operating system is started. There are viruses capable of infecting such objects specifically, which may lead, for example, to blocking of operating system startup.

Subscription

Enables use of the application with the selected settings (expiration date and the number of devices). You can pause or resume your subscription, renew it automatically, or cancel it.

SVM

Secure virtual machine – a special virtual machine on which the scanserver service (Protection Server, a component of Kaspersky Endpoint Security for Virtualization Light Agent) is installed.

Trusted device

Device that can be fully accessed at any time by the users listed under the trusted device settings.

Page top

[Topic 37531]

Information about third-party code

Information about third-party code is contained in the file legal_notices.txt located in the application installation folder.

Page top

[Topic 261863]

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

Amazon is a trademark of Amazon.com, Inc. or its affiliates.

FireWire is a trademark of Apple Inc.

Arm is a registered trademark of Arm Limited (or its subsidiaries) in the US and/or elsewhere.

The Bluetooth word, mark and logos are owned by Bluetooth SIG, Inc.

Ubuntu and LTS are registered trademarks of Canonical Ltd.

Citrix is a registered trademark or trademark of Cloud Software Group, Inc. and/or its subsidiaries in the United States and/or other countries.

Cloudflare, the Cloudflare logo, and Cloudflare Workers are trademarks and/or registered trademarks of Cloudflare, Inc. in the United States and other jurisdictions.

Docker and the Docker logo are trademarks or registered trademarks of Docker, Inc. in the United States and/or other countries. Docker, Inc. and other parties may also have trademark rights in other terms used herein.

Google Public DNS is a trademark of Google LLC.

HUAWEI, EulerOS, and FusionSphere are trademarks of Huawei Technologies Co., Ltd.

Core is a trademark of Intel Corporation or its subsidiaries.

Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.

Microsoft, Hyper-V, Outlook, Visual C++, and Windows are trademarks of the Microsoft group of companies.

OpenStack is a registered trademark of the OpenStack Foundation in the United States and other countries.

Oracle and JavaScript are registered trademarks of Oracle and/or its affiliates.

Red Hat, Red Hat Enterprise Linux, and CentOS are trademarks or registered trademarks of Red Hat, Inc. or its subsidiaries in the United States and other countries.

Debian is a registered trademark of Software in the Public Interest, Inc.

SUSE is a registered trademark of SUSE LLC in the United States and other countries.

VMware vSphere is a registered trademark and/or trademark of VMware, Inc. in the United States and other countries.

UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company Limited.

Page top