Kaspersky Endpoint Security for Linux

Managing policies in the Web Console

A policy is a set of Kaspersky Endpoint Security operation settings applied to an

. You can use policies to apply identical Kaspersky Endpoint Security settings to all client devices within an administration group.

Multiple policies with different values of the settings can be configured for a single application. However, there can be only one active policy at a time for an application within an administration group. When you create a new policy, all other policies within an administration group become inactive. You can change the policy status later.

Policies have a hierarchy, similarly to administration groups. By default, a child policy inherits the settings from the parent policy. A child policy is a policy of a nested hierarchy level, that is, a policy for nested administration groups and secondary Administration Servers. You can enable inheritance of the settings from the parent policy.

You can locally modify the values of the settings specified by the policy for individual devices within the administration group, if modification of these settings is not prohibited by the policy.

Each policy setting has a "lock" attribute that indicates whether child policy settings and local application settings can be modified. The "lock" status of a setting within a policy determines whether or not an application setting on a client device can be edited:

  • When a setting is "locked" (lock_policy), you cannot edit the setting locally. The setting value specified by the policy is used for all client devices within the administration group.
  • When a setting is "unlocked" (unlock), you can edit the setting locally. For all client devices in the administration group, the settings specified locally are used. The settings specified in the policy are not applied.

After the policy is applied for the first time, the application settings change in accordance with the policy settings.

You can perform the following operations with the policies:

You can also create policy profiles. A policy profile may contain settings that differ from the "base" policy settings and apply to client devices when the configured conditions (activation rules) are met. Using policy profiles allows you to flexibly configure operation settings for different devices. You can create and configure profiles in the Policy profiles section of the policy properties.

For general information on working with policies and policy profiles, refer to Kaspersky Security Center documentation.

In this section

Creating a policy

Editing policy settings

Changing policy status

Actions with policies

Deleting a policy

Page top
[Topic 202218]

Creating a policy

To create a policy:

  1. In the main window of the Web Console, select DevicesPolicies and policy profiles.

    The list of policies opens.

  2. Select the administration group containing client devices to which the policy should be applied. To do so, click the link in the Current path field in the upper part of the window and select an administration group in the window that opens.

    The list displays only the policies configured for the selected administration group.

  3. Click Add.

    The Policy Wizard starts.

  4. In the drop-down list, select Kaspersky Endpoint Security 12.0 for Linux.

    Proceed to the next step of the wizard.

  5. Decide whether you want to use Kaspersky Security Network. Carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you agree with all the terms and conditions of the Statement and want the application to use Kaspersky Security Network, select I confirm that I have fully read, understand, and accept the terms and conditions of Kaspersky Security Network Statement.
    • If you do not want to use Kaspersky Security Network, select I do not accept the terms and conditions of the Kaspersky Security Network Statement and confirm your decision in the window that opens.

    Refusal to use Kaspersky Security Network does not interrupt the policy creation process. At any time, you can enable or disable use of Kaspersky Security Network or change the KSN mode for managed devices in the policy settings.

    Proceed to the next step of the wizard.

  6. Specify the Kaspersky Endpoint Security usage mode:
    • Standalone mode – the application is used to protect devices running Linux operating systems.
    • Light Agent mode for protecting virtual environments – as part of the Kaspersky Security for Virtualization Light Agent solution, the application is used to protect virtual machines running Linux guest operating systems.
  7. If you are using the application in Light Agent mode to protect virtual environments, configure the SVM discovery settings:
    1. Select the method that Light Agents use to discover SVMs available for connection.
      • Use the Integration Server

        If this option is selected, Light Agent connects to Integration Server to get a list of SVMs available for connection and their details.

      • Use a custom list of SVM addresses

        If this option is selected, you can specify a list of SVMs that Light Agents managed by this policy can connect to. Light agents will only connect to SVMs specified in the list.

      If you select the Use a custom list of SVM addresses option, the Light Agent is using the extended SVM selection algorithm, and large infrastructure protection mode is enabled on an SVM (for more information, see the Kaspersky Security for Virtualization Light Agent Help), then connecting a Light Agent to this SVM is only possible if the SVM path is ignored. In the SVM selection algorithm section, you need to set the SVM path setting to Ignore SVM path. If any other value is set, Light Agents will not be able to connect to the SVM.

    2. If you select Integration Server, the wizard displays the current settings for connecting Light Agents to the Integration Server: address and port for connecting. If necessary, specify new connection settings:
      1. Click the Configure button and specify new connection settings in the window that opens:
        • Address

          IP address in IPv4 format or fully qualified domain name (FQDN) of the device on which the Integration Server is installed.

          If a NetBIOS name, "localhost", or 127.0.0.1 is specified as the address, the connection to the Integration Server fails with an error.

        • Port

          Port for connecting to the Integration Server.

          Port 7271 is used by default.

      2. Click the Check button.
      3. The web plug-in checks the SSL certificate received from the Integration Server. If the certificate contains an error or is not trusted, a corresponding message is displayed in the Connection to the Integration Server window.

        You can view information about the certificate received from the Integration Server by clicking on the View the received certificate line. If you encounter problems with an SSL certificate, we recommend to make sure that the data transmission channel you are using is secure.

        To save the received certificate and continue connecting to the Integration Server, in the Select an action block, select the Ignore option.

      4. Specify the password of the Integration Server administrator (password of the admin account) and click the Test button.

        The New Policy Wizard connects to the Integration Server. If the connection fails, an error message appears in the window. If the connection succeeds, the Connection to the Integration Server window closes, and the Connection to the Integration Server field of the New Policy Wizard window shows the Connected status.

    3. If you select a manually defined list of SVM addresses, the window displays a list of SVMs that Light Agents managed by this policy can connect to. To add an SVM to the list, click the Add button and in the window that opens specify the IP address in IPv4 format or the fully qualified domain name (FQDN) of the SVM. You can enter multiple IP addresses or FQDNs of SVMs on a new line.

      Specify only fully qualified domain names (FQDNs) that map to a single IP address. Using a fully qualified domain name that corresponds to multiple IP addresses can lead to errors in the application.

      You can delete addresses selected in the list by clicking the Delete button.

    Proceed to the next step of the wizard.

  8. The General tab of the new policy settings window opens. Specify a name for the new policy.

    You can also configure the following policy settings:

    • Policy status:
      • Active. The policy that is currently applied to the device. If this option is selected, this policy becomes active on the device upon the next device synchronization with the Administration Server. This option is selected by default.
      • Inactive. The policy that is not currently applied to the device. If this option is selected, the policy becomes inactive but remains in the Policies folder. You can activate the inactive policy later.
      • Out-of-office. Policy that becomes active when the device leaves the corporate network. If this option is selected, the policy becomes active when the device leaves the organization network.
    • Policy settings inheritance:
      • Inherit settings from parent policy. If this option is enabled, the policy settings values are inherited from the upper-level group policy and, therefore, are locked. The check toggle button is switched on by default.
      • Enforce settings inheritance for child policies If this option is enabled, the settings values of the child policies are locked. The toggle button is switched off by default.

    For general information about the policy settings, refer to Kaspersky Security Center documentation.

  9. On the Application settings tab, you can modify the policy settings.
  10. Click Save.

The created policy will be displayed in the list of policies. You can change the policy settings later. For general information about managing policies, refer to Kaspersky Security Center documentation.

Page top
[Topic 202224]

Editing policy settings

To edit policy settings:

  1. In the main window of the Web Console, select DevicesPolicies and policy profiles.

    The list of policies opens.

  2. Select the administration group to which the policy is applied. To do so, click the link in the Current path field in the upper part of the window and select an administration group in the window that opens.

    The list displays only the policies configured for the selected administration group.

  3. Select the policy for which you want to modify the settings, and click the link with the policy name to open the policy properties window.
  4. Edit the policy settings.
  5. Click Save.

The policy is saved with the updated settings.

Page top
[Topic 202225]

Changing policy status

To change the policy status:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list, select the policy for which you want to modify the status, and click the link with the policy name to open the policy properties window.
  3. On the General tab, in the Policy status section, select the required status:
    • Active. The policy that is currently applied to the device.

    If this option is selected, this policy becomes active on the device upon the next device synchronization with the Administration Server. This option is selected by default.

    • Inactive. The policy that is not currently applied to the device.

    If this option is selected, the policy becomes inactive but remains in the Policies folder. You can activate the inactive policy later.

    • Out-of-office. Policy that becomes active when the device leaves the corporate network.

    If this option is selected, the policy becomes active when the device leaves the organization network.

  4. Click Save.

The policy status is changed.

Page top
[Topic 202227]

Actions with policies

To copy, move, export, or import a policy:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list of policies, check the box next to the name of the required policy and click the action button above the list of policies.
Page top
[Topic 246014]

Deleting a policy

To delete a policy:

  1. In the main window of the Web Console, select the DevicesPolicies and profiles tab.

    The list of policies opens.

  2. In the list of policies, select a check box next to the policy that you want to delete.

    You can select several policies to delete them simultaneously.

  3. Click the Delete button above the list of policies.
  4. Confirm the deletion.
Page top
[Topic 202226]