Kaspersky Security for Virtualization 6.0 Agentless

Managing File Threat Protection

The settings that Kaspersky Security applies for protection of virtual machines are defined using policies.

Kaspersky Security protects only powered-on virtual machines that have been assigned a protection profile.

When a user or program attempts to access a virtual machine file, Kaspersky Security scans this file.

  • If no viruses or other malware are detected in the file, Kaspersky Security grants access to this file.
  • If viruses or other malware is detected in a file, Kaspersky Security assigns the Infected status to the file. If the scan cannot conclusively determine whether or not the file is infected (the file may contain a code sequence that is characteristic of viruses or other malware, or contain modified code from a known virus), Kaspersky Security also assigns the Infected status to the file.

    Kaspersky Security then performs the action that is specified in the protection profile of the virtual machine; for example, it disinfects or blocks the file.

If an application that collects information and sends it to be processed is installed on a virtual machine, Kaspersky Security may classify this application as malware. To avoid this, you can exclude the application from protection. The list of exclusions is configured in the protection profile settings.

The Signature analysis and machine learning scan method is used for protection of virtual machines. Protection that uses signature analysis provides a minimally acceptable security level. Kaspersky Security uses application databases containing information about known threats and about the methods to neutralize them. Based on the recommendations of Kaspersky experts, the Signature analysis and machine learning scan method is always enabled.

Additionally, during virtual machines protection, the Heuristic analysis is used. This is a technology designed for detecting threats that cannot be detected with the aid of Kaspersky application databases. Heuristic analysis detects files that could be infected with malware for which there are not yet any database signatures or infected with a new variety of a known virus. Files in which a threat is detected during heuristic analysis are marked as Infected.

The heuristic analysis level depends on the selected security level:

  • If the security level is set to Low, the superficial heuristic analysis level is applied. Heuristic Analyzer does not perform all instructions in executable files while scanning executable files for malicious code. At this heuristic analysis level, the probability of detecting a threat is lower than at the medium heuristic analysis level. Scanning is faster and consumes less resources of the SVM.
  • If the security level is set to Recommended, High, or Custom, the medium heuristic analysis level is applied. While scanning files for malicious code, Heuristic Analyzer performs the number of instructions in executable files that is recommended by Kaspersky experts.

Information about all events that occur during protection of virtual machines is sent to the Kaspersky Security Center Administration Server.

You are advised to regularly view the list of files blocked in the course of virtual machine protection and manage them. For example, you can save file copies to a location that is inaccessible to a virtual machine user or delete the files. You can view the details of blocked files by filtering events by the File blocked event (for more details on events, please refer to the Kaspersky Security Center documentation).

To gain access to files that were blocked as a result of virtual machine protection, you must exclude these files from protection in the settings of the protection profile assigned to the virtual machines, or temporarily disable the protection of these virtual machines.

In this section:

Configuring main protection profile settings

Managing additional protection profiles

Creating an additional protection profile

Viewing the protected infrastructure in a policy

Assigning protection profile to virtual machines

Disabling file threat protection for virtual machines

Page top
[Topic 186129]

Configuring main protection profile settings

You can configure the settings of the main protection profile while creating a policy (during the Configure main protection profile settings step) or in the properties of the policy after it is created (in the Main protection profile subsection in the File Threat Protection section).

To configure main protection profile settings:

  1. In the Security level section, select the security level at which Kaspersky Security scans virtual machines:
    • If you want to install one of the pre-installed security levels (High, Recommended, or Low), use the slider to select one.
    • To change the security level to Recommended, click the Default button.
    • If you want to configure the security level on your own, click the Settings button. In the Security level settings window that opens:
    1. In the Scanning archives and compound files section, specify the values of the following settings:
    2. In the Performance section, specify the values of the following settings:
    3. In the Objects to detect section, click the Settings button. In the Objects to detect window that opens, specify the values of the following settings:
      • Kaspersky Security always scans virtual machine files for viruses, worms, and Trojans. That is why the Viruses and worms and Trojans settings in the Malware section cannot be changed.

    4. In the Objects to detect window, click OK.
    5. In the Security level settings window, click OK.

      If you have changed security level settings, the application creates a custom security level. The name of the security level in the Security level section changes to Custom.

  2. In the Action on threat detection section, select an action .
  3. If you do not want Kaspersky Security to scan files on network drives when protecting virtual machines running Windows operating systems, clear the Scan network drives check box in the Protection scope section. By default, when protecting virtual machines running Windows operating systems, the application scans all files that have not been excluded from protection on network drives.

    When protecting virtual machines running Linux operating systems, Kaspersky Security always scans files of supported network file systems (NFS and CIFS). If you want to exclude files of network file systems from the protection scope, you must configure a protection exclusion for the directory in which the network file system is mounted.

    Kaspersky Security always scans files on removable and hard drives. For this reason the Scan all removable drives and hard drives setting in the Protection scope section cannot be edited.

  4. To exclude certain files of virtual machines from protection, in the Exclusions from protection section, click the Settings button.

    In the Exclusions from protection window that opens, specify the following settings:

    1. In the File extensions section, choose one of the following options:
      • Scan all except files with the following extensions. In the text box, specify a list of extensions of files to not scan when a virtual machine is being protected. Kaspersky Security ignores the case of characters in the extensions of files that are to be excluded from the protection scope.
      • Scan files with the following extensions only. In the text box, specify a list of extensions of files to scan when the virtual machine is being protected. When protecting virtual machines running Linux operating systems, Kaspersky Security is case sensitive regarding the characters in the extensions of files that are to be included in the protection scope. When protecting virtual machines running Windows operating systems, the application ignores the cases of characters in file extensions.

      You can type file extensions in the field by separating them with a blank space, or by typing each extension in a new line. File extensions may contain any characters except . * | \ : " < > ? /. If an extension includes a blank space, the extension should be typed inside quotation marks: "doc x".

      If you have selected Scan files with the following extensions only in the drop-down list but have not specified the extensions of files to scan, Kaspersky Security scans all files.

    2. In the Files and folders table, use the Add, Change, and Delete buttons to create the list of objects to be excluded from protection.

      By default, the list of exclusions includes the objects recommended by Microsoft (please refer to the list of recommended exclusions on the Microsoft website). Kaspersky Security excludes these objects from protection on all virtual machines to which the main protection profile has been assigned. You can view and edit the list of these objects in the Files and folders table.

      You can exclude objects of the following types from protection:

      • Folders. Files stored in folders at the specified path are excluded from protection. For each folder, you can specify whether to apply the exclusion from protection to subfolders.
      • Files by mask. Files with the specified name, files located at the specified path, or files matching the specified mask are excluded from protection.

        You can use the * and ? symbols to specify a file mask.

      Kaspersky Security ignores the case of characters in paths to files and folders that are excluded from protection.

      You can save a configured list of exclusions to a file using the Export button or load a previously saved list of exclusions from a file using the Import button. To import or export a list of exclusions, you can use a file in XML format. You can also import a list of exclusions from a file in DAT format. Using a file in DAT format, you can import a list of exclusions that was generated in other Kaspersky applications.

    If your exclusions list uses an environment variable that has multiple values depending on the bit rate of the application that uses it, in 64-bit Windows operating systems, objects corresponding to all values of the variable are excluded from protection. For example, if you are using the variable %ProgramFiles%, objects located in the folder C:\Program files and in the folder C:\Program files (х86) are excluded from protection.

  5. In the Exclusions from protection window, click OK.
  6. Save the changes by clicking Next (in the New Policy Wizard) or Apply (in the policy properties).

The new protection profile settings are applied after data is synchronized between Kaspersky Security Center and the SVMs.

Page top
[Topic 188576]

Managing additional protection profiles

You can manage additional protection profiles in the properties of a policy in the list of additional protection profiles.

To open the list of additional protection profiles in the policy properties:

  1. In the tree of the Kaspersky Security Center Administration Console, select the Managed devices folder.
  2. In the workspace, select the Policies tab.
  3. Select a policy in the list of policies and double-click the policy to open the Properties: <Policy name> window.
  4. In the policy properties window, in the File Threat Protection section, select the additional protection profiles subsection.

    A list of additional protection profiles will appear in the right part of the window. If you have not yet created additional protection profiles in this policy, the list of protection profiles is empty.

In the list of additional protection profiles, you can do the following:

  • Create additional protection profiles.
  • Change the name of an additional protection profile by clicking the Rename button.
  • Edit the settings of additional protection profiles by clicking the Change button. The settings are edited in the Protection settings window. The additional protection profile settings are identical to the main protection profile settings.
  • Export the settings of an additional protection profile to a file by clicking the Export button. To save the settings of an additional protection profile, you need to specify the path to a file in JSON format. You can use previously saved settings when creating a new additional protection profile.
  • Delete additional protection profiles by clicking the Delete button. If this protection profile was used for virtual machine protection, the application will protect these virtual machines using the settings of the protection profile that was assigned to their parent object in the virtual infrastructure. If the parent object has been excluded from protection, the application does not protect such virtual machines.
Page top
[Topic 188577]

Creating an additional protection profile

To create an additional protection profile:

  1. In the Kaspersky Security Center Administration Console, open the list of additional protection profiles in the properties of the policy for which you want to create an additional protection profile.
  2. Click the Add button.

    The Protection profile window opens.

  3. In the window that opens, enter the name of the new protection profile.

    A protection profile name cannot contain more than 255 characters.

  4. If you want to use previously saved protection profile settings when creating a new protection profile, select the Import settings from file check box and specify the path to the file in JSON format.
  5. In the Protection profile window, click OK.

    The Protection settings window opens. In this window, you can configure the settings of the new protection profile or change protection profile settings that were imported from a file.

    The additional protection profile settings are identical to the main protection profile settings, with the exception of the default list of exclusions.

    By default, the list of exclusions does not include objects recommended by Microsoft Corporation (please refer to the list of exclusions recommended by Microsoft on the Microsoft website). If you want the objects recommended by Microsoft to be excluded from protection on all virtual machines that have been assigned this protection profile, you need to import the microsoft_file_exclusions.xml file into the protection profile exclusions. The microsoft_file_exclusions.xml file is included in the application distribution kit and is located in the setup folder of the Kaspersky Security administration plug-in on the computer on which the Kaspersky Security Center Administration Console is installed. After importing the file, you can view and edit the list of these objects in the Files and folders table in the Exclusions from protection window.

  6. After configuring all settings of the protection profile, click OK in the Protection settings window.

    In the Properties: <Policy name> window, a new protection profile appears in the list of additional protection profiles.

You can assign the created protection profile to virtual machines.

Page top
[Topic 188579]

Viewing the protected infrastructure in a policy

In policy properties, you can view the protected infrastructure selected for the policy, and information about the use of protection profiles.

To view information about the protected infrastructure in a policy:

  1. In the Kaspersky Security Center Administration Console, open the policy properties:
    1. In the console tree, select the Managed devices folder.
    2. In the workspace, select the Policies tab.
    3. Select a policy in the list of policies and double-click the policy to open the Properties: <Policy name> window.
  2. In the policy properties window, in the File threat protection section, select the Protected infrastructure subsection.

    The Kaspersky Security administration plug-in attempts to automatically connect to the Integration Server. If the connection fails, the Connection to Integration Server window opens. In the Connection to Integration Server window, specify the Integration Server address and click OK.

  3. The Kaspersky Security administration plug-in verifies the SSL certificate received from the Integration Server. If the received certificate contains an error, the Certificate verification window containing the error message opens. The SSL certificate is used to establish a secure connection to the Integration Server. If there are problems with the SSL certificate, it is recommended to make sure that the utilized data transfer channel is secure. To view information on the received certificate, click the View the received certificate button in the window containing the error message. You can install the certificate you received as a trusted certificate to avoid receiving a certificate error message at the next connection to the Integration Server. To do so, select the Install received certificate and stop showing warnings for <Integration Server address> check box.

    To continue connecting, click the Continue button in the Certificate verification window. If you selected the Install received certificate and stop showing warnings for <Integration Server address> check box, the received certificate is saved in the operating system registry on the computer where the Kaspersky Security Center Administration Console is installed. The application also checks the previously installed trusted certificate for the Integration Server. If the received certificate does not match the previously installed certificate, a window opens to confirm replacement of the previously installed certificate. To replace the previously installed certificate with the certificate received from the Integration Server and continue connecting, click the Yes button in this window.

After connecting to the Integration Server, the right part of the window displays information about the protected infrastructure and the use of protection profiles.

Information about the protected infrastructure

The protected infrastructure is displayed as a tree of items. The root element is the "vCloud Director organization" object, which combines all virtual Datacenters of your virtual infrastructure.

If the virtual infrastructure contains two or more virtual machines with the same ID (vmID), only one virtual machine appears in the object tree. If this virtual machine has been assigned a protection profile, the settings of this protection profile are applied to all virtual machines that have the same ID (vmID).

Information about the assignment of protection profiles to virtual infrastructure objects

The Protection profile column displays information about the assignment of protection profiles to objects of the protected infrastructure. Kaspersky Security uses the settings of assigned protection profiles when protecting virtual machines.

The information is displayed as follows:

  • The name of an expressly assigned protection profile is highlighted in black.
  • The name of a protection profile inherited from a parent object is highlighted in gray. The name is formed as follows: "inherited: <N>", where N represents the name of the protection profile that was inherited from a parent object.
  • If no protection profile has been assigned to an object of the protected infrastructure (the object has been excluded from protection), the Protection profile column displays the value (Not assigned).

By default, the main protection profile is assigned to the root element "vCloud Director organization" and is inherited by all objects of the virtual infrastructure.

Page top
[Topic 188590]

Assigning protection profile to virtual machines

To assign a protection profile to a virtual machine:

  1. In the policy properties, select the Protected infrastructure subsection.
  2. In the table, select one or more virtual machines.

    If you want to assign the same protection profile to all virtual machines that are child objects of a single virtual Datacenter, select this Datacenter in the table. You can simultaneously select multiple virtual machines or other virtual infrastructure objects in the table by holding down the CTRL key.

  3. Click the Select protection profile button.

    The Selecting protection profile window opens.

  4. Select one of the following options:
    • Inherit parent protection profile: <name>. Select this option if you want to assign the protection profile of the parent object to a virtual machine or other virtual infrastructure object.
    • Use protection profile. Select this option and indicate the protection profile name in the drop-down list to assign this protection profile to a virtual machine or other virtual infrastructure object. The list contains the main protection profile and all additional protection profiles that you configured in this policy.
  5. If the selected virtual infrastructure object has child objects, the protection profile is assigned to the object and to all of its child objects, including objects that have been assigned their own protection profile or that have been excluded from protection. If you want to assign the protection profile only to the selected virtual infrastructure object and to its child objects that inherit the protection profile and that have not been excluded from protection, clear the Apply to all child objects check box.
  6. Click OK.

    The Selecting protection profile window will close, and the assigned protection profile will be displayed in the table in the Protected infrastructure subsection.

  7. In the Properties: <Policy name> window, click OK.
Page top
[Topic 188591]

Disabling file threat protection for virtual machines

To disable virtual machine protection:

  1. In the policy properties, select the Protected infrastructure subsection.
  2. If you want to disable protection for one or multiple virtual machines:
    1. In the table, select one or more virtual machines.

      If you want to disable protection for all virtual machines that are child objects of a single virtual Datacenter, select this Datacenter in the table. You can simultaneously select multiple virtual machines or other virtual infrastructure objects in the table by holding down the CTRL key.

    2. Click the Select protection profile button.

      The Selecting protection profile window opens.

    3. Select the Do not use protection profile option.
    4. If you selected a Datacenter, protection will be disabled by default for all virtual machines within it, including virtual machines that have been assigned their own protection profile. If you want to disable protection only for those virtual machines that inherit the protection profile from the parent object, clear the Apply to all child objects check box.
    5. Click OK.

      The Selecting protection profile window closes. In the table in the Protected infrastructure subsection, the value shown in the Protection profile column for virtual machines that have been excluded from protection is (Not assigned).

  3. If you want to disable protection for all virtual machines in your virtual infrastructure, clear the Use File Threat Protection check box located in the upper part of the window.
  4. In the Properties: <Policy name> window, click OK.
Page top
[Topic 57988]