- About this Help
- What's new
- Sources of information about the application
- To administrator
- Kaspersky Security 9.0 for SharePoint Server
- Application architecture
- Access rights for managing Kaspersky Security
- Preparing to install
- Features of the application installation on a SharePoint farm
- Upgrading from a previous version of the application
- About Kaspersky Security upgrades
- Tips for upgrading Kaspersky Security on a SharePoint farm
- Upgrading Kaspersky Security on a standalone SharePoint server or the first server in a SharePoint farm
- Connecting Administration Console to a SharePoint farm when updating Kaspersky Security
- Starting the application upgrade
- Restarting the SharePoint Timer service
- Application setup procedure
- Step 1. Installing the required components
- Step 1. Viewing the welcome screen and License Agreement
- Step 3. Selecting the type of installation
- Step 4. Selecting the application components
- Step 5. Configuring the connection between Kaspersky Security and SQL database
- Step 6. Select an account for running Kaspersky Security services
- Step 7. Completing installation
- Changes in the system after installing the application
- Getting started. Application Configuration Wizard
- Restoring the application
- Removing the application
- Application licensing
- Getting started
- Control Center
- On-access scan
- About on-access scan
- About anti-phishing scans
- Kaspersky Security operation depending upon the SharePoint server settings
- General
- Enabling and disabling on-access anti-virus scanning
- Configuring basic scan settings
- Configuring object processing rules for on-access scanning
- Enabling and disabling on-access content filtering
- Enabling and disabling SharePoint web object scanning
- Enabling and disabling Anti-Phishing scanning of web content
- Anti-Virus scan exclusions
- Creating on-access Anti-Virus scan exclusions
- File mask
- Content filtering rules
- Configuring additional settings for on-access content filtering
- On-demand scan
- About on-demand scanning
- Creating an on-demand scan task
- Starting and stopping on-demand scan tasks
- Viewing an on-demand scan task report
- Deleting an on-demand scan task
- Task settings – General
- Task settings – Scan scope
- Web address
- Selecting and excluding from on-demand scanning areas of the SharePoint structure
- Task settings – Exclusions from scan
- File mask
- Creating on-demand Anti-Virus scan exclusions
- Task settings – Content filtering rules
- Configuring content filtering
- Content filtering
- About content filtering
- About the white list
- Creating the white list
- Filter by keywords tab
- Category name
- Keyword settings
- Creating, renaming, and deleting user categories of unwanted words and phrases
- Importing a list of unwanted words and phrases into a user category from a text file
- Adding, changing, and deleting unwanted words and phrases in user categories
- Filter by masks tab
- Set name
- File mask
- Creating, renaming, and deleting a set of masks for unwanted file names
- File name mask creation rules
- Changing a set of unwanted file name masks
- Backup
- About Backup
- Viewing the list of files in Backup
- Quick file search in Backup
- Extended file search in Backup
- Restoring files from Backup
- Rules for restoring files when version control is enabled in SharePoint
- Saving files from Backup to disk
- Removing files from Backup
- Purging Backup manually
- Configuring automatic Backup purging
- Updates
- About database updates
- Updates – General
- Configuring automatic database updates
- Updates – Database update settings
- Configuring the local database update settings on SharePoint servers of the farm
- SharePoint server database update settings
- Viewing the information about updates to the anti-virus database
- Updating databases manually
- Propagating global database update settings to SharePoint farm servers
- Notifications
- Reports
- Settings
- About participation in Kaspersky Security Network
- About logs
- About the log of content filtering
- KSN Protection Settings
- Enabling and disabling Data Leak Prevention
- Configuring the path to the logs folder
- Configuring the log storage term
- Configuring the detail level of event logs
- Diagnostics settings window
- Failsafe support for SQL databases
- Licensing
- To security officer
- Kaspersky Security 9.0 for SharePoint Server
- Using categories. Assigning data to categories
- Monitoring and preventing data leaks
- Categories and policies
- Settings of a category of table data
- Table data. Setting up the match level
- Settings of a category of keywords
- Keywords. Making expressions using operators
- Category: <Category name>
- New Policy Wizard. Step 1
- New Policy Wizard. Step 2
- New Policy Wizard. Step 3
- New Policy Wizard. Step 4
- File formats to scan
- Policy settings – Policy
- Policy settings – Users
- Control scope
- Web address
- Policy settings – Actions
- Searching SharePoint websites for data
- Managing incidents
- Assessing the status of data protection
- Generating application reports
- Reports
- Main settings of the detailed report
- Main settings of the report on users
- Additional report settings
- System report settings
- Main settings of the statistical report
- Additional settings of the statistical report
- Main settings of the detailed report
- Main settings of the report on users
- System report settings
- Main settings of the report on policies
- Additional task settings
- Run mode
- Additional instructions
- Archiving incidents
- Enabling the incremental scanning
- Restoring incidents from the archive
- Selecting categories for generating incident statistics
- Adding a search task
- Adding a report generation task
- Adding a category of keywords
- Adding a category of table data
- Adding a file to exclusions by web address
- Starting a report creation task
- Starting and stopping a data search
- Editing the search task settings
- Editing report generation task settings
- Editing a category
- Changing incident details displayed in the table
- Changing the contents of a Kaspersky Lab category
- Changing the status of an incident
- Copying incident details to the clipboard
- New Policy Wizard
- Configuring automatic notifications
- Configuring settings of the report on policy-related incidents
- Configuring the report on users
- Configuring system KPI report settings
- Configuring settings of the incident status report
- Updating the list of incidents
- Searching for incidents using a filter
- Searching for policies by users
- Searching for similar incidents
- Viewing incident details
- Viewing the report on policy-related incidents
- Viewing the system KPI report
- Viewing the report on users
- Viewing the incident status report
- Viewing the search results
- Viewing protection status details
- Generating a quick report
- Saving reports
- Saving search results
- Deleting archived incidents
- Deleting a task
- Deleting a category
- Deleting a report
- Deleting a policy
- Deleting the search results
- Contacting the Technical Support Service
- Glossary
- Activating the application
- Active key
- Active policy
- Additional key
- Anti-virus databases
- Archived incident
- Archiving
- Backup
- Black list of key files
- Closed incident
- Confidential data
- Control scope
- Corporate security
- Data category
- Data leak
- Data leak prevention
- Data search
- Data subcategory
- Disinfection
- DLP Module (Data Leak Prevention)
- DLP Module status
- False positive incident
- File blocking
- Full scan
- Incident
- Incident status
- Incremental scanning
- Infected object
- Kaspersky CompanyAccount
- Kaspersky Lab categories
- Kaspersky Lab update servers
- Kaspersky Security Network (KSN).
- Key file
- Keywords
- License certificate
- License term
- Management Console
- Match level
- Object removal
- On-access scan
- On-demand scan
- Opened incident
- Personal data
- Phishing
- Policy
- Policy violation
- Probably infected object
- Search scope
- Search task
- Security Officer
- SharePoint server structure
- Skipping of an object
- System KPI (Key Performance Indicators)
- Table data
- Unwanted content
- Update
- User category
- Violation context
- Virus
- Working scenario
- Kaspersky Lab AO
- Information about third-party code
- Trademark notice
Policy settings – Actions
On the Actions tab, you can configure automatic actions to be performed by the application when the policy is violated.
Block file upload to SharePoint
Block transfers of files to SharePoint if they contain data matching the category.
If this check box is selected, the application blocks transfers of files to SharePoint if they contain data matching the category. This restriction covers users and websites that are specified in the policy settings.
If this check box is cleared, the application does not block file transfers to SharePoint when the policy is violated.
Regardless of whether the check box is selected or cleared, when the policy is violated, the application logs the event as a possible data leakage and creates an incident.
The check box is cleared by default.
Create incidents with priority
Assessment of the danger of a potential data leak.
In the Create incidents with priority drop-down list, you can specify the priority that the application should assign to an incident when the policy is violated:
- Low
- Medium
- High
Attach file to incident details
Add the file to the incident details.
If this check box is selected, when creating an incident, the application updates the incident details, adding the file that caused the policy violation while being transferred to SharePoint. You can open the file on SharePoint when handling the incident.
If this check box is cleared, the incident details display only the web address of the file on SharePoint.
The check box is selected by default.
Record event to Windows Event Viewer
Adding of policy violation records to Windows Event Viewer.
If the check box is selected, the application records policy violation events in Windows Event Viewer.
If the check box is cleared, events are not recorded in Windows Event Viewer.
The check box is cleared by default.
Automatically send notifications of policy violations to the following email addresses:
- To security officer;
You can specify the email address of a security officer in the Data Leak Prevention node.
- To user (to the user associated with the incident);
- To user's manager;
- Additionally(you can specify additional email addresses in this entry field, separating them with semicolons).
If the check box next to a recipient's name is selected, the application automatically sends notifications of policy violation to this email. The application uses email addresses specified in Active Directory accounts when sending notifications to the user associated with the incident and to his or her manager. If no email addresses are specified in Active Directory accounts, no notifications will be sent.
If this check box is cleared, automatic sending of notifications is disabled.
By default, the Send notification by email check box is cleared.
Use these settings for the following tasks |
See also |