Contents
Solution architecture
Protection Server component
Kaspersky Security Protection Server (hereinafter also "Protection Server") is the scanserver service installed on a special virtual machine known as an SVM (secure virtual machine). An SVM is included in the Kaspersky Security distribution kit as a virtual machine image. During installation of the solution, you need to deploy SVMs from an image on hypervisors in the virtual infrastructure.
Protection Server performs the following functions:
- Scans the fragments of files sent by Light Agents installed on virtual machines for viruses and other malware. The SharedCache technology is used for scan. It optimizes the speed of file scan by excluding files that have been already scanned on another virtual machine. The Protection Server stores information about scanned files in a cache on the SVM in order to not scan them again.
- This ensures that the application receives an update package from the Kaspersky Security Center Administration Server repository, which contains the database and application module updates necessary for operation of the solution.
- Manages license keys and licensing restrictions.
Light Agent component
The Light Agent component must be installed on each virtual machine that needs to be protected using the Kaspersky Security solution. A virtual machine with the Light Agent component installed is called protected virtual machine.
Kaspersky Security for Virtualization 6.1 Light Agent protects virtual machines running Linux guest operating systems. To protect virtual machines running Windows guest operating systems, use Kaspersky Security 5.2 Light Agent.
The Kaspersky Security solution uses Kaspersky Endpoint Security for Linux as the Light Agent for Linux. Kaspersky Endpoint Security for Linux, running in Light Agent mode, protects virtual machines running Linux operating systems from various types of threats and network and phishing attacks. For more information about the functionality of Kaspersky Endpoint Security for Linux, see the Kaspersky Endpoint Security for Linux Help.
When launched, the Light Agent establishes and maintains a connection to the SVM in order to interact with the Protection Server component.
Integration Server component
The Integration Server component facilitates interaction between Kaspersky Security solution components and the virtual infrastructure.
The Integration Server is used for performing the following tasks:
- Deploying, removing, and reconfiguring SVMs with Protection Servers.
- Receiving information from the virtual infrastructure about the protected infrastructure, and sending this information to Protection Servers on SVMs. The Integration Server can connect to hypervisors, virtual infrastructure administration servers, or cloud infrastructure microservices to acquire this information (depending on the type of virtual infrastructure).
- Receipt by Light Agents of a list of SVMs available for connection and information about them. This information is necessary for interaction between Light Agents and Protection Servers on the SVMs.
- Deploying and using the Kaspersky Security solution in multi-tenancy mode.
The Integration Server is managed using the Integration Server Console.
To use the Integration Server in the operation of Light Agents and Protection Servers, you need to configure the settings for connecting SVMs and Light Agents to the Integration Server.
After configuring the settings for connecting SVM to the Integration Server, SVM transmits the following information to the Integration Server every 5 minutes:
- IP address and number of ports for connecting to the SVM.
- Information about the SVM path in the virtual infrastructure.
- Information about the license used to activate the solution on the SVM.
- Information about the average load of the Protection Server on the SVM.
A Light Agent attempts to connect to the Integration Server once every 30 seconds if the Light Agent has no information about any SVM and the last attempt to connect to the Integration Server failed. After a Light Agent receives information about SVMs from the Integration Server, the connection interval increases to 5 minutes.
During its operation, the Integration Server saves the following information:
- Accounts for connecting the Integration Server Console, SVM, and Light Agents to the Integration Server.
- Settings for connecting the Integration Server to the virtual infrastructure and the Kaspersky Security Center Administration Server.
- If the solution is used in multi-tenancy mode: a list of registered tenants and information about the time that virtual machines were protected by the solution.
- SVM service data.
All data is stored in encrypted form. Information is stored on the device on which Integration Server is installed and is not sent to Kaspersky.
Management plug-ins and Network Agent
The interface for managing Kaspersky Security solution components using Kaspersky Security Center is provided by Kaspersky Security management plug-ins.
Network Agent, a component of Kaspersky Security Center, facilitates interaction between the Kaspersky Security solution and Kaspersky Security Center, and also provides the ability to manage Kaspersky Security solution components via Kaspersky Security Center.
Network Agent must be installed on each virtual machine that needs to be protected using the Kaspersky Security solution. Network Agent does not need to be installed on SVMs because this component is included in the SVM images.
SVM deployment options
VMware vSphere platform
The following options are available for deploying SVMs on VMware virtual infrastructure:
- Deployment on a standalone VMware ESXi hypervisor managed by a VMware vCenter Server.
- Deployment on VMware ESXi hypervisors that are part of a cluster managed by a VMware vCenter Server.
After deployment, the SVM is automatically assigned to the hypervisor, i.e. it does not migrate to other VMware ESXi hypervisors within the cluster.
- Deployment on VMware ESXi hypervisors managed by VMware vCenter servers in Linked mode.
To deploy SVMs on VMware ESXi hypervisors, you can use a Microsoft SCVMM virtual infrastructure administration server.
XenServer platform
The following SVM deployment options are available on a XenServer virtual infrastructure:
- Deployment on a standalone XenServer hypervisor
- Deployment on a hypervisor that is part of a XenServer hypervisor pool.
An SVM can be deployed in the local storage of the hypervisor or in the shared storage of a XenServer hypervisor pool.
After startup, an SVM deployed in shared storage is run on the hypervisor within the XenServer hypervisor pool that has the most resources and/or is under the least load. If a key with a limitation on the number of processor cores key has been installed on an SVM, the number of processor cores on the hypervisor the SVMs are running on is considered when checking the license restrictions.
Microsoft Hyper-V platform
The following options are available for deploying SVMs on Microsoft Hyper-V virtual infrastructure:
- Deployment on a standalone Microsoft Windows Server (Hyper-V) hypervisor.
- Deployment on Microsoft Windows Server (Hyper-V) hypervisors that are part of a hypervisor cluster managed by the Windows Failover Clustering service.
During deployment of an SVM on a Microsoft Windows Server (Hyper-V) hypervisor, all files required for operation of the SVM are stored in a separate folder. This folder is assigned the same name as the SVM.
To deploy SVMs on Microsoft Windows Server (Hyper-V) hypervisors, you can use a Microsoft SCVMM virtual infrastructure administration server.
KVM platform
SVM deployment on a standalone KVM hypervisor is supported.
Proxmox VE platform
SVM deployment on a standalone Proxmox VE hypervisor is supported.
Basis (Skala-R) platform
SVM deployment on R-Virtualization hypervisors that are part of a hypervisor cluster managed by a Basis.vControl (Skala-R Management) server is supported.
HUAWEI FusionSphere platform
The following options are available for deploying SVMs on HUAWEI virtual infrastructure:
- Deployment on a standalone HUAWEI FusionCompute CNA hypervisor managed by a HUAWEI FusionCompute VRM server.
- Deployment on HUAWEI FusionCompute CNA hypervisors that are part of a cluster managed by a HUAWEI FusionCompute VRM server.
Nutanix Acropolis platform
The following options are available for deploying SVMs on Nutanix Acropolis virtual infrastructure:
- Deployment on Nutanix AHV hypervisors that are a part of a hypervisor cluster managed by a Nutanix Prism Element server.
- Deployment on Nutanix AHV hypervisors that are a part of a hypervisor cluster managed by a Nutanix Prism Element server that is managed by Nutanix Prism Central.
OpenStack platform, VK Cloud platform, and TIONIX Cloud Platform
SVMs are deployed on hypervisors used within .
ALT Virtualization Server platform
An SVM can be deployed on a standalone hypervisor of the ALT Virtualization Server platform.
Astra Linux Platform
SVM deployment on a standalone KVM hypervisor running on the Astra Linux Platform is supported.
Numa vServer platform
SVM deployment on a standalone Numa vServer hypervisor is supported.
Page topConnecting Light Agent to SVM
For the Kaspersky Security solution to function, constant interaction between the Light Agent and the Protection Server is required. If there is no connection to the Protection Server, the Light Agent cannot transfer file fragments to the Protection Server for scanning, and scanning is not performed. If Light Agent loses a connection to the Protection Server for more than 5 minutes while running scan tasks, the scan tasks stop and return an error.
To interact with the Protection Server, the Light Agent establishes and maintains a connection to the SVM on which this Protection Server is installed.
Light Agent can connect only to an SVM on which the version of the Protection Server is compatible with the version of the Light Agent. Kaspersky Endpoint Security for Linux 12.1 in Light Agent mode can connect to an SVM with version 6.1.
To connect to an SVM, Light Agent must receive information about the SVMs to which a connection can be made. Light Agent selects an available SVM that is optimal for connection according to the SVM selection algorithm.
Regardless of the algorithm used in selecting SVMs, Light Agents also take into account the following parameters:
- Availability of a valid license (a license key that is not in the denylist is added to the SVM, and the license associated with the key has not expired). Light Agent first connects to the SVM on which the solution is activated (the key is added).
- Type of the license key added to the SVM. If you add a server or desktop key to the SVM, the Light Agent first connects to the SVM on which the key type corresponds to the operating system installed on the virtual machine with Light Agent.
- Protecting the connection between the Light Agent and the Protection Server. A Light Agent for which connection protection is enabled can only connect to SVMs for which encryption of the data channel between the Light Agent and the Protection Server is enabled. A Light Agent for which connection protection is disabled can only connect to SVMs for which channel encryption is disabled or an unsecure connection between the Light Agent and the Protection Server is allowed.
- SVM connection tags. If a tag is assigned to a Light Agent, the Light Agent can only connect to SVMs that are configured to use that connection tag.
Bear in mind that the availability of some of the Light Agent functionality depends on the license edition that was used to activate the solution on the SVM:
- Functionality available under an Enterprise license is available in Light Agent only if Light Agent is connected to an SVM using the solution under an Enterprise license. When you disconnect Light Agent from the current SVM and connect to an SVM with a different license edition, the scope of functionality available in Light Agent changes.
- The Kaspersky Endpoint Detection and Response Optimum functionality is available on a Light Agent only if the Light Agent is connected to an SVM on which the solution is activated with an EDR Optimum license (an EDR Optimum license key is added on the SVM). Disconnecting the Light Agent from the current SVM and connecting to an SVM that does not have an EDR Optimum key added results in the Kaspersky Endpoint Detection and Response Optimum functionality becoming unavailable on the Light Agent.
To prevent Light Agents from switching between SVMs with different license editions, you can use connection tags or lists of SVMs available for connection.
You can obtain information about the status of the connection of Light Agent for Linux to an SVM on a protected virtual machine using the Kaspersky Endpoint Security for Linux command kesl-control --svm-info
. For more information about Kaspersky Endpoint Security for Linux commands, see the Kaspersky Endpoint Security for Linux Help.
Information about the loss and restoration of the connection of the Light Agent and SVM can be saved as events in Kaspersky Security Center.
Using virtual machine snapshots taken on a running guest OS (live snapshots) is not recommended for SVMs and virtual machines with Light Agent installed. Restoring from such snapshots results in loss of the connection between Light Agents and the SVMs and degrades the performance of the virtual infrastructure. You can use virtual machine snapshots taken on a running guest OS only if the "Notify only" mode is enabled in the Light Agent settings. For more details, see the Kaspersky Endpoint Security for Linux Help.
About SVM discovery
Light Agent can discover SVMs running on the network in one of the following ways:
- Using the Integration Server. SVMs relay information about themselves to the Integration Server. The Integration Server compiles a list of SVMs available for connection, and sends this list to Light Agents.
In a large-sized virtual infrastructure running the OpenStack platform, VK Cloud platform, or TIONIX Cloud Platform, you can limit the size of the list of SVMs available for connection that the Integration Server relays to Light Agents. The Integration Server can transfer information only about the limited number of available SVMs, which you specified in the Integration Server configuration file.
To use this method of SVM discovery, you must connect SVMs and Light Agents to the Integration Server.
- With the use of the list of SVM addresses. You can specify a list of SVM addresses to which Light Agents can connect.
If the extended SVM selection algorithm is used for the Light Agent, and large infrastructure protection mode is enabled on the SVMs, it is recommended to select the Integration Server as the method for Light Agents to discover SVMs.
Each Light Agent can only use one of two possible SVM detection methods.
You can configure the SVM discovery settings for Light Agents for Linux in a Light Agent for Linux policy (in a policy for the Kaspersky Endpoint Security for Linux application).
Page topAbout the SVM selection algorithms
Light Agents can apply one of the following SVM selection algorithms for connection:
You can specify which SVM selection algorithm the Light Agents will use, and configure the settings for using the extended SVM selection algorithm.
Page topAbout data processing
During their operation, Kaspersky Security solution components may save and send to other solution components and to other Kaspersky applications the following information that may contain personal and confidential data:
- While deploying the SVM and editing SVM settings, the SVM Management Wizard or the Integration Server (also when using the Integration Server REST API) send the
root
andklconfig
passwords configured by the user to the SVM. - To make the installation and operation of the solution possible, the SVM Management Wizard and the Integration Server (also when using the Integration Server REST API) receive information about the virtual infrastructure, save it, and transmit it between each other and to the Protection Server. The transmitted data can contain names of the virtual machines, IP-addresses or names of the hypervisors, virtual infrastructure administration servers, or cloud infrastructure microservices, as well as account settings for connecting to virtual infrastructure.
- The Protection Server sends the Kaspersky Security Center Administration Server a list of Light Agents connected to the SVM. The transmitted information may include the name of the protected virtual machine and the path to it in the virtual infrastructure.
- The Integration Server Console sends the Integration Server the data necessary for configuring the solution's operating settings. The transmitted data can contain addresses of hypervisors, virtual infrastructure administration servers, or cloud infrastructure microservices, as well as account settings for connecting to virtual infrastructure. If the solution is installed in an infrastructure managed by a VMware vCenter Server and VMware NSX Manager, the address and settings of the accounts used to connect to VMware NSX Manager may also be sent.
- Light Agent sends the following data to the Protection Server:
- To activate the Light Agent: the validity term of the license key status confirmation; the ID (BIOS ID) of the protected virtual machine; information about the license that the Light Agent needs to work.
- To update the Light Agent databases: software identifier obtained from the license; full version of the software; software license identifier; software installation identifier (PCID); processed web address; license type; identifier of the update start.
- To provide protection, while scan tasks are running: information that is necessary for scanning objects. The transmitted information may include the names of files and paths to them in the file system, the checksums of files, web addresses, and the scanned objects or their fragments.
- To obtain statistics: OS version of the protected virtual machine; localization of the Light Agent; names of the active Light Agent components; ID (BIOS ID) of the protected virtual machine.
- To get information that is used when selecting an SVM for connection, the Light Agent sends the identifier of the protected virtual machine to the Integration Server and the Protection Server.
- In an infrastructure managed by a VMware vCenter Server and VMware NSX Manager, Light Agents and the Protection Server may send the Integration Server information about security tags that are assigned to a protected virtual machine upon detection of viruses, malware, or activity that is typical of network attacks. The IDs of protected virtual machines are also sent.
- The Protection Server and Light Agent receive the operating settings specified using policies from the Kaspersky Security Center Administration Server. The transmitted information may include the paths to files and registry keys, web addresses, IP addresses of the Integration Server and SVMs, settings for connecting SVMs and Light Agents to the Integration Server, public and private keys of SVMs, and the public key of the Integration Server.
- When using the solution in multitenancy mode, the Integration Server receives information about tenants and their virtual machines via the Integration Server REST API and stores it in the database. The following data may be sent: tenant name, identifier, and description, and other information about the tenant specified by the service provider's administrator; identifier of a tenant's virtual machine; account settings for connecting to a virtual Kaspersky Security Center Administration Server configured for the tenant; identifier of virtual Kaspersky Security Center Administration Server. The Integration Server may send information stored in the database about tenants and tenant virtual machines to the Integration Server Console for display or upon request to the Integration Server REST API.
- When using the solution in multitenancy mode, the information necessary for generating tenant protection reports may be sent to the Protection Server from Light Agents, and from the Protection Server to the Integration Server. The following data may be sent: identifiers of SVMs and the protected virtual machine, type and version of the guest operating system installed on the protected virtual machine, time intervals when the Light Agent was connected to SVMs.
- When using the application in multitenancy mode, the Integration Server sends to Kaspersky Security Center Administration Server the information required to create a tenant protection infrastructure: tenant name, account settings for connecting to the virtual Kaspersky Security Center Administration Server, and operating settings specified using policies, including IP addresses of the Integration Server and SVMs.
- During the execution of tasks, the Protection Server and Light Agent send information about the task settings and results to the Kaspersky Security Center Administration Server. The transmitted information may include the user name and password indicated in the task settings for the user account used to run the task.
- To generate reports and events, the Protection Server and Light Agents send information about the operation of the solution to Kaspersky Security Center Administration Server. The transmitted information may include user names, names of processed files and paths to them in the file system, and processed web addresses.
- While activating the solution, the Protection Server receives from the Kaspersky Security Center Administration Server and saves license information, including information about the client to which the license was issued, and the number of the license specified in the license certificate. After activation, the Protection Server sends to the Kaspersky Security Center Administration Server information about the license that was used to activate the solution; this is done to keep track of license limits and generate a report about license key usage. The Protection Server also sends information about the license that was used to activate the solution to the Light Agent, this is done to activate the Light Agent.
For more details on data that Kaspersky Endpoint Security for Linux used in Light Agent mode may send to other Kaspersky applications, see the Kaspersky Endpoint Security for Linux Help.
The specified information is transmitted over encrypted data channels (except for the information necessary for scanning objects, and the information that is used when selecting SVMs). The connection between Light Agents and Protection Servers is not encrypted by default. You can enable encryption of the data channel between the Light Agents and the Protection Servers in the solution settings.
Page top