Kaspersky Endpoint Security for Mac

Contents

[Topic kes96495]

Kaspersky Endpoint Security overview

Kaspersky Endpoint Security protects computers running macOS against viruses and other computer security threats.

File Anti-Virus

File Anti-Virus protects the computer's file system in real time by intercepting and analyzing any attempts to access files. Learn more.

Web Anti-Virus

Web Anti-Virus protects information sent and received by the computer over the HTTP and HTTPS protocols in Safari, Google Chrome, and Firefox. Learn more.

Network Attack Blocker

Network Attack Blocker protects the computer against intrusions into the operating system. This component protects against cyberattackers (who use port scanning and brute-force attacks) and the malware they installed (including malware that tries to send personal data to criminals). Learn more.

Virus Scan

Kaspersky Endpoint Security detects and neutralizes viruses and other computer security threats on demand in the specified scan scope. Kaspersky Endpoint Security can run a full scan of the computer, a quick scan of critical areas, and a scan of the specified scope. Learn more.

Update

Kaspersky Endpoint Security updates application databases and modules from Kaspersky Lab update servers, Kaspersky Security Center, or other sources specified by your system administrator and creates backup copies of all updated files to allow a rollback of the last update. Learn more.

Backup

Kaspersky Endpoint Security creates a backup copy of infected files prior to any attempt to disinfect or delete them, making it possible for you to restore them. Learn more.

Reports

Kaspersky Endpoint Security generates reports about events and actions involving application components. Learn more.

Notifications

Kaspersky Endpoint Security uses notifications to inform you about certain events in the operation of Kaspersky Endpoint Security. Notifications can be accompanied by sound. Learn more.

Protection Center

Kaspersky Endpoint Security displays protection status messages in Protection Center. Protection Center shows information on the current status of computer protection and how to eliminate computer security problems and threats. Learn more.

Remote management of the application via Kaspersky Security Center

Kaspersky Security Center lets you remotely manage protection of computers with Kaspersky Endpoint Security installed: receive information on the current computer protection status, remotely fix issues, respond to computer security threats, enable or disable protection components (File Anti-Virus, Web Anti-Virus, Network Attack Blocker), run virus scan tasks, update application databases, run startup disk encryption, and manage Kaspersky Endpoint Security licenses. Learn more.

FileVault disk encryption

Kaspersky Endpoint Security allows managing FileVault encryption remotely. Encryption prevents other users from unauthorized access to sensitive data stored on the startup disk of the user's computer.

Note: The FileVault disk encryption feature will be available in Kaspersky Security Center 10 SP3. For more information, contact Kaspersky Lab Technical Support.

Page top

[Topic kes88954]

Distribution kit

The distribution kit includes the Kaspersky Endpoint Security installation package which contains the following files:

  • Files that are required to install the application in any of the available ways.
  • The license_<loc>.txt file with the End User License Agreement.

    The End User License Agreement specifies the terms of use of the application.

Unpack the zipped installation package to access its files.

Page top

[Topic kes118665]

Hardware and software requirements

Kaspersky Endpoint Security has the following hardware and software requirements:

  • Mac with an Intel processor
  • 1 GB of memory (RAM)
  • 1.2 GB of free disk space
  • OS X 10.9, 10.10 or 10.11, macOS 10.12 or 10.13 operating system
  • Internet connection

Supported browsers:

  • Safari
  • Chrome
  • Firefox

Kaspersky Endpoint Security is compatible with the following virtualization tools:

  • Parallels Desktop 11 for Mac Standard Edition
  • Parallels Desktop 11 for Mac Pro Edition
  • Parallels Desktop 11 for Mac Business Edition
  • Parallels Desktop 12 for Mac Standard Edition
  • Parallels Desktop 12 for Mac Pro Edition
  • Parallels Desktop 12 for Mac Business Edition
  • Parallels Desktop 13 for Mac Standard Edition
  • Parallels Desktop 13 for Mac Pro Edition
  • Parallels Desktop Business Edition
  • VMware Fusion 8
  • VMware Fusion 8 Professional
  • VMware Fusion 8.5
  • VMware Fusion 8.5 Professional
  • VMware Fusion 10
  • VMware Fusion 10 Professional

You can manage Kaspersky Endpoint Security remotely via Kaspersky Security Center. The plug-in for managing Kaspersky Endpoint Security via Kaspersky Security Center requires Kaspersky Security Center 10.5 and later.

See also

Prepare for installation

Install Kaspersky Endpoint Security

Uninstall Kaspersky Endpoint Security

Page top

[Topic kes118668]

Prepare for installation

Before installing Kaspersky Endpoint Security on your computer, it is recommended to do the following:

  • Make sure that your computer meets the hardware and software requirements.
  • Remove Kaspersky Internet Security for Mac or any other anti-virus applications to avoid system conflicts and maximize system performance.

See also

Hardware and software requirements

Install Kaspersky Endpoint Security

Uninstall Kaspersky Endpoint Security

Page top

[Topic kes118670]

Install Kaspersky Endpoint Security

Important: Kaspersky Lab experts recommend installing Kaspersky Endpoint Security only as described in this guide.

You can install Kaspersky Endpoint Security in one of the following ways:

Perform a standard installation of Kaspersky Endpoint Security

  1. Unpack the ZIP archive from the distribution kit.
  2. Open the .dmg file from the contents of the unpacked archive.
  3. In the window that opens, double-click Install Kaspersky Endpoint Security.

    The Kaspersky Endpoint Security installer opens.

  4. Click the Continue button.

    The End User License Agreement window opens.

  5. In the End User License Agreement window, carefully read the End User License Agreement and do one of the following:
    • If you don't accept the terms of the End User License Agreement, click the Decline button and confirm that you want to quit the Kaspersky Endpoint Security installer.

      Installation of Kaspersky Endpoint Security is canceled.

    • If you accept the terms of the End User License Agreement, click the Accept button.

      Installation of Kaspersky Endpoint Security continues and the Participation in Kaspersky Security Network window opens.

  6. In the Participation in Kaspersky Security Network window, carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you don't accept the terms of participation in Kaspersky Security Network, click the Decline and Install button and continue the installation.
    • If you accept all the terms of participation in Kaspersky Security Network, click the Accept and Install button and continue the installation.

      When you participate in

      , Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac.

      Note: Kaspersky Lab doesn't collect, process, or store any personal data. You can join or opt out of participation in Kaspersky Security Network at any time.

  7. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to install Kaspersky Endpoint Security.

    The installation of Kaspersky Endpoint Security continues.

  8. When the installation is finished, click the Finish button to quit the installer.

Kaspersky Endpoint Security starts automatically. You don't have to restart your computer.

Perform a custom installation of Kaspersky Endpoint Security

  1. Unpack the ZIP archive from the distribution kit.
  2. Open the .dmg file from the contents of the unpacked archive.
  3. In the window that opens, double-click Install Kaspersky Endpoint Security.

    The Kaspersky Endpoint Security installer opens.

  4. Click the Customize button.

    The Choose components to install window opens.

  5. In the Choose components to install window, deselect checkboxes next to components that you don't want to install and click the Continue button.

    The End User License Agreement window opens.

  6. In the End User License Agreement window, carefully read the End User License Agreement and do one of the following:
    • If you don't accept the terms of the End User License Agreement, click the Decline button and confirm that you want to quit the Kaspersky Endpoint Security installer.

      Installation of Kaspersky Endpoint Security is canceled.

    • If you accept the terms of the End User License Agreement, click the Accept button.

      Installation of Kaspersky Endpoint Security continues and the Participation in Kaspersky Security Network window opens.

  7. In the Participation in Kaspersky Security Network window, carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you don't accept the terms of participation in Kaspersky Security Network, click the Decline and Install button and continue the installation.
    • If you accept all the terms of participation in Kaspersky Security Network, click the Accept and Install button and continue the installation.

      When you participate in Kaspersky Security Network, Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac.

      Note: Kaspersky Lab doesn't collect, process, or store any personal data. You can join or opt out of participation in Kaspersky Security Network at any time.

  8. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to install Kaspersky Endpoint Security.

    The installation of Kaspersky Endpoint Security continues.

  9. When the installation is finished, click the Finish button to quit the installer.

Kaspersky Endpoint Security starts automatically. You don't have to restart your computer.

See also

Hardware and software requirements

Prepare for installation

Uninstall Kaspersky Endpoint Security

Page top

[Topic kes134772]

Prepare the application for use

After Kaspersky Endpoint Security is installed, you can do the following:

Page top

[Topic kes118671]

Uninstall Kaspersky Endpoint Security

  1. Open the DMG file of the application distribution kit.
  2. In the window with the contents of the distribution kit, double-click Uninstall Kaspersky Endpoint Security.

    The Kaspersky Endpoint Security uninstaller starts.

  3. In the Introduction window, click Uninstall.
  4. In the prompt for administrator credentials, enter an administrator name and password and confirm that you want to uninstall Kaspersky Endpoint Security.

    Uninstallation of Kaspersky Endpoint Security starts.

  5. In the Completion window, read the information about completion of uninstallation and click Finish to quit the uninstaller.

Kaspersky Endpoint Security is now uninstalled from your computer. You don't have to restart your computer after uninstalling the application.

See also

Hardware and software requirements

Prepare for installation

Install Kaspersky Endpoint Security

Page top

[Topic kes58162]

Main application window

Open the main application window

In the menu bar, click the application icon and choose Kaspersky Endpoint Security.

Purpose of the main application window

In the main window of Kaspersky Endpoint Security, you can view information about the status of computer protection, status of File Anti-Virus, Web Anti-Virus, and Network Attack Blocker, and progress of virus scan and update tasks.

In the main application window, you can also do the following:

  • Open the Virus Scan window to manage virus scan tasks
  • Open the Update window to manage update task.
  • Open the Licensing window to manage application keys.
  • Open Protection Center.

Controls of the main application window

The main application window includes the following controls:

  • Protection status indicator (in the shape of a computer)
  • Buttons at the top of the main application window
  • Buttons at the bottom of the main application window

The protection status indicator signals the current computer protection status.

  • Green indicates that computer protection is at an optimal level.
  • Yellow and red warn of the presence of various problems related to Kaspersky Endpoint Security configuration or operation.

In addition to the protection status indicator, the right pane of the main application window describes the computer protection status and displays information Protection Center about the latest computer security issues and threats. If a virus scan is running, information on its progress (percentage complete) is also displayed in the right pane of the main application window.

You can perform the following actions by clicking the buttons at the top of the main application window:

Open the window with reports on Kaspersky Endpoint Security tasks.

Open the Kaspersky Endpoint Security preferences window.

Open a window with information on how to contact Technical Support.

Open the Kaspersky Endpoint Security Help system.

You can perform the following actions by clicking the buttons at the bottom of the main application window:

Open the virus scan tasks window: Quick Scan, Full Scan, and Custom Scan.

Open the Update window.

Open the Licensing window.

Page top

[Topic kes58161]

Kaspersky Endpoint Security icon

As soon as Kaspersky Endpoint Security is installed, the Kaspersky Endpoint Security icon appears in the menu bar. When the application is activated, the application icon shows the status of the application. If the application icon is active ( ), it means that all or some of protection components are enabled. If the application icon is inactive ( ), then all of protection components are disabled.

Open the application icon menu

In the menu bar, click the application icon.

The application icon is always displayed in the menu bar. You can hide the application icon in the menu bar. When you open the application window, the application icon also appears in the Dock.

From the application icon menu, you can access the main application window and perform the following actions:

  • Disable computer protection.
  • Resume computer protection.
  • Open Protection Center.
  • Start Quick Scan.
  • Run an update.
  • Open the application preferences window.
  • Quit Kaspersky Endpoint Security.

Hide the application icon in the menu bar

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Appearance tab, in the Application icon section, deselect the Show in menu bar checkbox.
Page top

[Topic kes58163]

Application preferences window

Open the Kaspersky Endpoint Security preferences window

Do one of the following:

  • In the main application window, click the  button.
  • In the menu bar, click the application icon and choose Preferences.

Application preferences can be accessed quickly using the following tabs in the upper part of the preferences window:

  • Protection. On this tab, you can enable or disable the computer protection and configure File Anti-Virus, Web Anti-Virus, and Network Attack Blocker preferences.
  • Virus Scan. On this tab, you can configure the preferences of virus scan tasks and scheduled startup of virus scan tasks.
  • KSN. On this tab, you can join or opt out of participating in Kaspersky Security Network.
  • Threats. On this tab, you can select the categories of objects to be detected and create Trusted Zone.
  • Update. On this tab, you can configure the preferences of application updates or roll back to the previous version of application databases.
  • Reports. On this tab, you can configure preferences of Kaspersky Endpoint Security report and Backup, and enable or disable the logging of debugging information in a trace file.
  • Appearance. On this tab, you can configure preferences of Kaspersky Endpoint Security icon and notifications.

By using the button, you can block users without administrator rights from editing the preferences of Kaspersky Endpoint Security. This button is located in the lower part of the application preferences window. To edit the preferences, you must enter the administrator's credentials.

Clicking the button opens the Kaspersky Endpoint Security Help which describes all of the preferences in the current application window. You can also open Help for the currently active application window by selecting Open Help for This Window in the Help menu.

Page top

[Topic kes96666]

About notifications

Kaspersky Endpoint Security displays notifications to inform you of application events. Depending on the version of the operating system installed on the computer, notifications appear in the operating system's Notification Center. The appearance of notifications depends on the options set in the operating system's Notification preferences.

Kaspersky Endpoint Security events are divided into three types according to their importance:

  • Critical events that pose a dangerous threat to computer security (detection of malicious objects, vulnerabilities, problems with Kaspersky Endpoint Security). Critical events require your immediate attention. We recommend that you not disable notifications about critical events.
  • Important events that do not require your immediate attention, but may pose a threat to computer security in the future.
  • Informational – events reported for your information.

Disable notifications

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Appearance tab, deselect the Enable notifications checkbox.

Select types of event notification that you don't want to receive

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Appearance tab, deselect checkboxes next to types of events that you don't want to be notified of.

Regardless of whether notifications are enabled or disabled, the application reports include information about events that occur while Kaspersky Endpoint Security is running.

Notifications can be accompanied by sound (for example, notifications about a detected virus). You can disable notification sound.

Disable sound alerts that accompany notifications

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Appearance tab, deselect the Enable notification sound checkbox.

If an action is required in response to an event, Kaspersky Endpoint Security displays notification windows. For example, when the application detects a malicious object, it prompts you to delete or disinfect the object. A notification window disappears from the screen only after one of actions is selected.

Page top

[Topic kes73374]

About the End User License Agreement

The End User License Agreement (License Agreement) is a binding agreement between you and AO Kaspersky Lab that stipulates the terms on which you may use the application.

Important: Carefully read the License Agreement before you start using the application.

You can view the terms of the End User License Agreement using the following methods:

  • During installation of Kaspersky Endpoint Security
  • By reading the license.rtf document in the application installation folder

By installing Kaspersky Endpoint Security, you confirm that you understand and accept the terms of the End User License Agreement. If you don't accept the terms of the End User License Agreement, cancel installation of Kaspersky Endpoint Security and don't use the application.

Page top

[Topic kes69240]

About the license

A license is a time-limited right to use the application, granted under the terms of the End User License Agreement.

A license entitles you to the following kinds of services:

  • Use of the application in accordance with the terms of the End User License Agreement
  • Getting technical support

The scope of services and validity period depend on the type of license under which the application was activated.

The following license types are provided:

  • Trial. A free license intended for trying out the application.

    A trial license usually has a short term. When the trial license expires, all Kaspersky Endpoint Security features become disabled. To continue using the application, you need to purchase a commercial license.

    You can activate the application under a trial license only once.

  • Commercial. A paid license granted upon purchase of the application.

    When the commercial license expires, key features of the application become disabled. To continue using Kaspersky Endpoint Security, you must renew your commercial license. If you are not planning to renew your license, you must remove the application from your computer.

We recommend renewing the license before it expires, to ensure maximum protection against all security threats.

Page top

[Topic kes74860]

About subscription

A subscription for Kaspersky Endpoint Security is a purchase order for the application with specific parameters (expiry date, number of devices protected). You can order a subscription for Kaspersky Endpoint Security from your service provider (such as your ISP). You can manage your subscription in the member area on the service provider's website. For example, you can renew or cancel your subscription, reduce its term, or change the number of devices protected under your subscription.

A subscription can be limited (for one year, for example) or unlimited (without an expiration date). To keep Kaspersky Endpoint Security working after expiration of a limited subscription term, you have to renew it manually. An unlimited subscription is renewed automatically as long as you have paid the service provider in advance.

If you use the application under a limited subscription, when the subscription expires you will be given a grace period to renew your subscription. The application remains functional during the grace period.

After your subscription expires and after the grace period for subscription renewal ends, Kaspersky Endpoint Security remains functional but stops updating application databases.

To use Kaspersky Endpoint Security under subscription, you have to add the activation code received from the service provider. When you use the application under subscription, you cannot use a different activation code for renewing your subscription. You can apply a different activation code only after the subscription expires or if you cancel the subscription. To cancel your subscription, contact the service provider from which you bought Kaspersky Endpoint Security.

Note: A different subscription activation code can be applied only when the active key is deleted. The subscription doesn't have a key file. You can't add the subscription as a reserve key.

If you are already using Kaspersky Endpoint Security under a valid license but want to use the application under subscription instead, remove the current active key so that you can activate the application using a subscription key. The activation code that was previously used to activate the application on this computer can be used on a different computer.

Note: Possible subscription options may vary with each service provider. Some service providers may also choose not to provide a grace period for renewing subscriptions.

Page top

[Topic kes73976]

About the license certificate

A license certificate is a document that you receive along with a key file or an activation code.

A license certificate contains the following information about the license provided:

  • Order number
  • Information about the user who has been granted the license
  • Information about the application that can be activated under the license provided
  • Limit of the number of licensing units (e.g., devices on which the application can be used under the license provided)
  • License validity start date
  • License expiration date or license term
  • License type
Page top

[Topic kes159745]

About the key

A key is a sequence of bits that you can apply to activate and then use the application in accordance with the terms of the End User License Agreement. Keys are generated by Kaspersky Lab specialists.

You can add a key to the application using one of the following methods: by applying a key file or by entering an activation code. The key is displayed in the application interface as a unique alphanumeric sequence after you add it to the application.

The key may be blocked by Kaspersky Lab in case the terms of the License Agreement have been violated. If the key has been blocked, you need to add another one if you want to use the application.

A key can be active or reserve.

An active key is a key that is currently used by the application. An active key can be added for a trial or commercial license or a subscription. The application cannot have more than one active key.

A reserve key is a key that entitles the user to use the application, but is not currently in use. The reserve key automatically becomes active when the license associated with the current active key expires. A reserve key can be added only if an active key has already been added.

A trial license key can be added as the active key. A key for the trial license cannot be added as the reserve key. A reserve key cannot be added when the trial license key is active.

Page top

[Topic kes69430]

About the activation code

An activation code is a unique sequence of 20 letters and numbers. You have to enter an activation code in order to add a key for activating Kaspersky Endpoint Security. You receive the activation code at the email address that you provided when you bought Kaspersky Endpoint Security or requested the trial version of Kaspersky Endpoint Security.

To activate the application with an activation code, you need Internet access in order to connect to Kaspersky Lab activation servers.

If you have lost your activation code after installing the application, it can be recovered. You may need the activation code to register a Kaspersky CompanyAccount, for example. To recover your activation code, contact Kaspersky Lab Technical Support.

Page top

[Topic kes69431]

About the key file

A key file is a file with the .key extension provided to you by Kaspersky Lab. Key files are designed to activate the application by adding a key.

You receive a key file at the email address that you provided when you bought Kaspersky Endpoint Security or ordered the trial version of Kaspersky Endpoint Security.

You do not need to connect to Kaspersky Lab activation servers in order to activate the application with a key file.

You can restore a key file if it has been accidentally deleted. You may need a key file to register a Kaspersky CompanyAccount, for example.

To restore your key file, perform any of the following actions:

  • Contact the license seller.
  • Receive a key file through Kaspersky Lab website by using your available activation code.
Page top

[Topic kes70562]

About data provision

End User License Agreement

When activating Kaspersky Endpoint Security by the activation code, in order to collect statistical information on the distribution and use of Kaspersky Lab products, you agree to automatically provide the following information during use of Kaspersky Endpoint Security:

  • The version of the installed software: the installed updates, installation ID and information about the current license.
  • The operating system version.
  • Identifiers of the Kaspersky Endpoint Security components that are active at the time of data provision.

Kaspersky Security Network statement

In order to identify new and challenging data security threats and their sources, as well as threats of intrusion, and to take prompt measures to increase the protection of the data stored and processed by the User with a computer, the User agrees to automatically provide the following information:

  • Information about the version of the operating system (OS) and service packs installed on the computer.
  • Information about the Right Holder's installed software and the anti-virus protection status, the unique user identifier in the KL services.
  • Information about all scanned objects and actions: the name of the scanned object, the date and time of the scan, the URL- and Referrer addresses from which it was downloaded, the size of scanned files and the paths to them, a sign of the archive, the date and time of file creation, the name, size and checksums (MD5, SHA2-256) of the packer (if the file was packed), the file's entropy, the file's type, the file type code, sign of executable file, identifier and format, the object's checksum (MD5, SHA2-256), the type and value of the object's supplementary checksum, data about the object's digital signature (certificate) , number of starts of the object since the last statistics sending the task identifier of the software that performed the scan, and the means of receiving information about the object's reputation, the value of the TARGET filter, technical parameters of the applicable detection technologies.
  • For executable files: the entropy of the file sections, reputation verification flag or file signature flag, name, type, ID, type, checksum (MD5) and the size of the application that was loaded by the object being validated, the application path and template paths, a sign of the Autorun list, date of entry, the list of attributes, name of the packer, information about the digital signature of the application: the publisher certificate, the name of the uploaded file in the MIME format, file build date and time.
  • Information about the running applications and their modules: checksums (MD5, SHA2-256) of running files, size, attributes, creation date, names of packers (if the file was packed), names of files, information about processes running on the system (process ID (PID), process name, information about the account the process was started from, the application and command that started the process, the full path to the process's files, and the starting command line, a description of the product that the process belongs to (the name of the product and information about the publisher), as well as digital certificates being used and information needed to verify their authenticity or information about the absence of a file's digital signature), and information about the modules loaded into the processes: their names, sizes, types, creation dates, attributes, checksums (MD5, SHA2-256, SHA1), the paths to them, PE-file header information, names of packers (if the file was packed), information about the availability and validity of these statistics, identifier of the mode for generating the statistics being sent.
  • If threats or vulnerabilities are detected, in addition to information about the detected object, information is provided about the identifier, version, and type of the record in the anti-virus database, the name of the threat based on the Right Holder's classification, the date and time of the last update of the anti-virus database, executable file name, the checksum (MD5) of the application file that requested the URL where the threat was detected, the IP address (IPv4 or IPv6) of the detected threat, the vulnerability identifier and its threat level, the URL and Referrer of the web page where the vulnerability was detected.
  • If a potentially malicious object is detected, information is provided about data in the processes’ memory.
  • Information about network attacks: the IP address of the attacking computer and the user's computer's port number at which the network attack is directed, the identifier of the protocol used to carry out the attack, and the name and type of attack.
  • Information about network connections: version and checksums (MD5, SHA2-256, SHA1) of the file from which process was started that opened the port, the path to the process’s file and its digital signature, local and remote IP-addresses, numbers of local and remote connection ports, connection state, timestamp of the port’s opening.
  • The URL and IP address of the web page where harmful or suspicious content was detected, the name, size, and checksum of the file that requested the URL, the identifier, weight and degree of the rule used to reach a verdict, the objective of the attack.
  • Information about updates of the installed product and anti-virus databases: the completion status of the update task, the type of an error that may occur during an update, the number of unsuccessful updates, the identifier of the product component that performs updates.
  • Aggregated data from the results of scanning using the local and cloud KSN databases: the version of the local KSN database on the computer at the time the statistics are sent, the software's database settings identifier, information about successful/unsuccessful requests to KSN, the duration of sessions with KSN, the amount of data sent and received, the times at which the collection of information to be sent to KSN was started and stopped.
  • Information about events in the systems logs: the event’s timestamp, the name of the log in which the event was found, type and category of the event, name of the event’s source and the event’s description.
  • Information to determine the reputation of files and URL-addresses: the URL-address at which the reputation is being requested and the Referrer, the connection’s protocol type, the internal identifier of the Software type, the number of the port being used, the User identifier, checksum of the scanned file (MD5), type of the detected threat, information about the record used to detect a threat (record identifier for the anti-virus databases, the record timestamp and type).

For additional examination the User agrees to provide files, their parts and checksums that could be exploited by intruders to harm the User’s computer.

Additionally, to prevent incidents and investigate those that do occur, the User agrees to provide trusted executable and non-executable files, reports about applications activity, portions of the computer’s RAM, and the operating system’s boot sectors, as well as the following information about files and processes:

  • The names and paths of the files that were accessed by the process.
  • URL- and IP-addresses that were accessed by the process.
  • URL- and IP-addresses from which the running file was downloaded.

To obtain data on the territorial distribution of software, you agree to automatically provide the right holder with the following information:

  • Software installation date and activation date.
  • Identifier of the partner who provided the license for software activation.
  • The software identifier, and the identifier of the software language localization.
  • Serial number of the license, installed in the software.
  • Sign of participation in KSN.

In order to promptly detect and fix errors associated with installation, uninstallation, and updating of the product, and to record the number of users, the User agrees to provide the following information:

  • Information about the Rightholder’s Software installed on the computer: the Software identifier, the identifier of the Software settings version.
  • Information about the versions of the operating system and installed updates: the word size, edition and parameters of the OS run mode.
  • Information about the license installed: the license type and its term, the number of days till the license expiration, identifier of the partner from whom the license was purchased.
  • Type of the Software installation on the computer (initial installation, updating, etc.) and the installation success flag or the installation error number, the type identifier of the computer and its model name.
  • Identifiers of 3rd party applications, which offer to install their application together with the Software, as well as identifiers of the 3rd party applications which were installed with the Software.

To improve performance of Kaspersky Lab’s products, the User agrees to submit the following information:

  • Information about computer: operating system and service packs installed, version and checksums (MD5, SHA2-256, SHA1) of the OS kernel file, parameters of the OS run mode.
  • Information about the software installed on the computer: the name of the software and the name of its publisher, information about software components files: checksums (MD5, SHA2-256, SHA1), name of a file, its path on the computer, size, version and digital signature.
  • Information about hardware installed on the computer: type, name, model name, firmware version, parameters of built-in and connected devices.
  • Information about the last unsuccessful OS restart: the number of unsuccessful restarts.

When participating in KSN, you agree to provide the following information for all purposes mentioned above:

  • The unique software installation identifier.
  • The full version of the installed software.
  • The type identifier of the installed software.
  • The unique identifier of the computer with the installed software.

Read Kaspersky Security Network Statement

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the KSN tab, click the Show KSN Statement button.

You agree to submit the following information for the purpose of Software identification during database and module updates:

  • Software ID (AppID)
  • Active license ID
  • Unique Software installation ID (InstallationID)
  • Unique Update task launch ID (SessionID)
  • Version of Software (BuildInfo)
  • Information about updating the Updater component, including unsuccessful update tasks, the number of failed starts after the upgrade, the version of the component, the error code, the ID of the type of update task, the status code of the software after the update, the date and time the statistics is sent.

To check the legitimacy of the Software use, the Rightholder reserves the right to verify that you have a licensed copy of Kaspersky Endpoint Security.

Kaspersky Endpoint Security can transmit the following license information needed to verify the legitimacy of the application use to the Kaspersky Lab:

  • Identifier of regional activation center.
  • Hashsum of activation code.
  • Time and date of ticket creation.
  • License information identifier.
  • License ticket identifier.
  • License ticket sequence identifier.
  • Unique identifier of user's computer HDD.
  • Date of from which the license ticket is valid.
  • The current state of license.
  • License version.
  • Ticket header ID.
  • Application ID of the currently used application.
  • List of application IDs of applications that are compatible with the currently used application.
  • Localization ID.
  • Application version.
  • Installation ID.
  • Application build ID.

Kaspersky Endpoint Security saves the following information in a Trace file:

  • Information about the anti-virus protection status of the Computer, as well as all detected objects and actions (including the name of the detected object, date and time of detection, the web address from which it was downloaded, the names and sizes of infected files and paths to them, the IP address of the attacking computer and the number of the Computer port targeted by the network attack, list of malware activity, and unwanted web addresses) and the decisions taken by the Software and the user on them
  • Information about applications downloaded by the user (web address, attributes, file size, and information about the process that downloaded the file)
  • Information about the applications launched and their modules (size, attributes, creation date, PE header details, region, name, location, and packers)
  • Information about interface errors and usage of the interface of the installed Kaspersky Lab Software
  • Information about network connections, including the IP address of the remote computer and the user's Computer, the numbers of ports through which the connection was established, and the network protocol of the connection
  • Information about network packets received and sent by the Computer over IT and telecom networks
  • Information about email and instant messages sent and received
  • Information about web addresses visited, including when the connection was established using an open protocol, data on the website access login and password, and the content of cookies
  • Server public certificate

Files (or their parts) that may be exploited by intruders to harm the Computer or data may be also sent to Kaspersky Lab to be examined additionally.

Kaspersky Lab protects any information thus received in accordance with law and applicable Kaspersky Lab rules.

Kaspersky Lab uses any received information in anonymized form and as general statistics only. Aggregate statistics are automatically generated from the source information received, and do not contain any personal or other confidential data. The original information received is destroyed as new information is accumulated (once a year). Aggregate statistics are stored indefinitely.

Participation in Kaspersky Security Network is voluntary. The decision to participate is made when you install Kaspersky Endpoint Security. However, you can change your decision later at any time.

Page top

[Topic kes58751]

Activate Kaspersky Endpoint Security

Important: Before activating Kaspersky Endpoint Security, make sure that the date and time that set on your computer match the actual date and time.

Activating the application involves adding a key to the application.

Note: An Internet connection is required to activate the application.

Activate the trial version

  1. Open the main application window and click the button.

    The Licensing window opens.

  2. In the Licensing window, click the Try button.
  3. In the Activate Trial Version window, click the Activate Trial Version button.

    Kaspersky Endpoint Security connects to Kaspersky Lab activation servers and sends data for verification. If verification is successful, the application receives and adds a key for the free trial version.

    Click the Finish button to finish activating the application.

    Important: A trial version of Kaspersky Endpoint Security can be activated only if the application has not been previously activated on the computer.

Activate the application with an activation code

  1. Open the main application window and click the button.

    The Licensing window opens.

  2. In the Licensing window, click the Activate button.
  3. In the Application Activation window, enter the activation code that you received when purchasing Kaspersky Endpoint Security.

    Note: An activation code is a unique combination of twenty Latin letters and numbers in the form xxxxx-xxxxx-xxxxx-ххххх.

    Kaspersky Endpoint Security connects to Kaspersky Lab activation servers and sends the activation code to verify its authenticity. If the activation code is successfully verified, the application automatically receives and adds the key.

    Note: Depending on the activation code that you have received, you may need to fill out a registration form.

    If activation code verification fails, a corresponding notification is displayed. In this case, contact the software vendor that supplied you with this activation code.

After you have activated the application with the activation code, you can view the following information in the Licensing window:

  • Active key
  • Key or subscription status
  • The number of computers on which you can use the application under the current license or subscription
  • License expiration date and time
  • Number of days until license expiration
Page top

[Topic kes58761]

View license information

View license information

Open the main application window and click the button.

The Licensing window opens.

The Licensing window may contain the following information:

  • Active key
  • Reserve key (if any)
  • License or subscription status
  • The number of computers on which you can use the application under the current license or subscription
  • License expiration date and time
  • Number of days until license expiration
Page top

[Topic kes159120]

Manage licenses and subscriptions

You have to renew the license if the license associated with the active key has expired and no reserve key has been added. When the license expires, the application continues to operate with limited functionality (updates, Kaspersky Security Network and FileVault disk encryption via Kaspersky Security Center become unavailable). You can still use all application components and run virus scans, but only with the anti-virus databases that were installed before the license expired.

Important: When your anti-virus databases are out of date, your computer is at increased risk of infection.

Renew a license

  1. Open the main application window and click the button.

    The Licensing window opens.

  2. In the Licensing window, click the Renew button.

A webpage opens, with information on renewing your license through the Kaspersky Lab online store or Kaspersky Lab partners. When you renew a license via an online store, an activation code for Kaspersky Endpoint Security is sent to the email address specified in the order form after you complete the payment.

When you use the application under subscription, Kaspersky Endpoint Security automatically contacts the activation server at specific intervals until your subscription expires.

If you use the application under an unlimited subscription, Kaspersky Endpoint Security renews your subscription without requiring any action from you.

If you use the application under a limited subscription and the grace period for renewing the subscription is over, Kaspersky Endpoint Security notifies you of this and stops trying to automatically renew the subscription and updating the application databases.

You can renew your subscription manually by contacting the vendor that sold you Kaspersky Endpoint Security.

Renew your subscription

  1. Open the main application window and click the button.

    The Licensing window opens.

  2. In the Licensing window, click the Visit Service Provider Website button.

    The website of your service provider opens.

Your subscription status may become out of date. In this case, you need to manually update the status of your subscription. If you do not have a current subscription, Kaspersky Endpoint Security stops updating the application databases.

Update subscription status

  1. Open the main application window and click the button.

    The Licensing window opens.

  2. In the Licensing window that opens, click the Verify Subscription Status button.
Page top

[Topic kes58262]

Open and quit the application

As soon as you complete installation of Kaspersky Endpoint Security, the application starts automatically and the application icon appears in the menu bar.

Open Kaspersky Endpoint Security

In the menu bar, click the application icon and choose Kaspersky Endpoint Security.

Quit Kaspersky Endpoint Security

In the menu bar, click the application icon and choose Quit.

When you quit the application, the application process is removed from computer memory.

Important: After you quit Kaspersky Endpoint Security, the computer is no longer protected and may become infected, which puts your data at risk of being loss.

Page top

[Topic kes58282]

View the status of computer protection

The protection status indicator, which is shaped like a computer and located in the main application window, informs you about computer protection problems. Depending on the status of computer protection, the color of the indicator can change. If Kaspersky Endpoint Security detects any security threats, a message about threats appears in the main application window and the indicator changes color.

The indicator color can change in the following ways:

  • Green. Your computer is appropriately protected.

    A green indicator signifies that anti-virus databases are up to date and all application components have been configured as recommended by Kaspersky Lab. No malicious objects have been detected, or any detected malicious objects have been neutralized.

  • Yellow. The level of computer protection is reduced.

    A yellow indicator signifies that Kaspersky Endpoint Security is aware of a problem. Such problems include, for example, minor deviations from the recommended protection settings or slightly outdated application databases.

  • Red. Your computer is at risk of infection.

    A red indicator signifies that there are dangerous problems that may lead to the infection of your computer and loss of data. For example, the anti-virus application databases are extremely out of date, the application is not activated, or malicious objects have been detected.

    It is recommended to fix problems and deal with security threats as soon as possible.

Page top

[Topic kes58285]

Disable and resume computer protection

By default, Kaspersky Endpoint Security starts after the operating system starts up, and protects your computer until it is turned off. All protection components (File Anti-Virus, Web Anti-Virus, and Network Attack Blocker) are enabled and running.

You can disable protection completely or disable specific protection components.

Important: Kaspersky Lab strongly advises against disabling protection or protection components, because disabling them may lead to infection of your computer and data loss.

When computer protection is disabled:

  • The application icon in the menu bar is inactive.
  • The protection status indicator in the main application window is red.

When one or more protection components are disabled, the protection status indicator is red or yellow.

Note: Disabling or pausing protection components does not affect virus scan tasks or the update task.

You can disable/resume computer protection in one of the following ways:

  • From the application icon
  • From the application preferences window

Disable/resume computer protection from the application icon

In the menu bar, click the application icon and choose Turn Protection Off/Turn Protection On.

Disable/resume computer protection from the application preferences window

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the General section, deselect/select the Enable protection checkbox.

Important: If you have disabled computer protection, it will not be re-enabled automatically when Kaspersky Endpoint Security starts again. You have to re-enable computer protection manually.

Disable a protection component

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the <component name> section, deselect the Enable <component name> checkbox.

Important: If you disable a protection component, it will not be re-enabled automatically when Kaspersky Endpoint Security starts again. You have to re-enable the protection component manually.

Enable a protection component

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the <component name> section, select the Enable <component name> checkbox.

To enable computer protection or protection components, you can also use Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when computer protection is disabled.

Page top

[Topic kes58772]

Perform scan tasks

The default Full Scan task is included in Kaspersky Endpoint Security. While running this task, the application scans memory, startup objects, and all internal drives of the computer for viruses and other malware.

Perform a full computer scan

  1. Open the main application window and click  .

    The Virus Scan window opens.

  2. In the Virus Scan window, click the  Full Scan button.

A full scan of the computer starts automatically.

The default Quick Scan task is included in Kaspersky Endpoint Security. While running this task, the application scans the critical areas of the computer (memory, startup objects, and system folders) for viruses and other malware.

Perform a quick computer scan

  1. Open the main application window and click  .
  2. The Virus Scan window opens.

  3. In the Virus Scan window, click the  Quick Scan button.

A quick scan of the computer starts automatically.

If you want to scan an individual object (such as an internal drive, folder, file, or removable drive) for viruses and other malware, you can run the Custom Scan task.

Scan a selected item

Drag a selected item to the application icon in the Dock.

Scan an object from the drop-down list of default custom scan objects

  1. Open the main application window and click  .
  2. The Virus Scan window opens.

  3. Click the Custom Scan button.

    A drop-down list where you can select objects to scan opens.

  4. In the drop-down list, select an object that you want to scan (for example, All Removable Drives).

The scan of the selected object starts automatically.

You can view the results of completed scan tasks in the Reports window.

Page top

[Topic kes58281]

Use Protection Center

Protection Center is a Kaspersky Endpoint Security feature that helps you analyze and fix problems and computer security threats.

Open Protection Center

Open the main application window and click the Show Details button.

In Protection Center, you can view a list of current problems and security threats. For each problem or threat, Kaspersky Endpoint Security suggests actions that you can perform to resolve the problem or threat. For example, if Kaspersky Endpoint Security detects infected files on the computer, you can click Disinfect. If the anti-virus databases are out of date, you can click Update. You can fix a problem or neutralize a threat immediately or later.

Fix a problem or neutralize a threat immediately

Click the button with the name of a recommended action to fix the problem or neutralize the threat.

The application performs the selected action.

If you close Protection Center without neutralizing dangerous threats, the protection status indicator in the main application window remains red to remind you of these threats.

In Protection Center, you can also view Kaspersky Endpoint Security recommendations and update task progress.

Page top

[Topic kes24613]

Configure the automatic start of a scheduled virus scan task

You can create a schedule for starting the Quick Scan and Full Scan tasks. Kaspersky Endpoint Security automatically scans the entire computer or critical areas of the computer in accordance with the configured schedule.

Configure the automatic start of a scheduled virus scan task

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab, select the name of the virus scan task in the task list on the left.
  4. In the Schedule section, select the checkbox corresponding to the desired start frequency and time for the selected virus scan task.
  5. Click the Schedule button and configure the virus scan task frequency and time.
  6. Click the Save button to save changes made to the virus scan task schedule.

You can view virus scan task results in the application reports window.

Page top

[Topic kes58779]

What to do if file access is blocked

Kaspersky Endpoint Security blocks access to infected files and applications. If a file is infected, it must be disinfected before it can be accessed.

Disinfect detected objects

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.
  3. The Reports window opens.

  4. In the left pane of the Reports window, select Detected objects.

    The Active group in the right pane of the window displays a list of detected objects with their respective statuses. You can expand the list of objects by clicking the button.

  5. Disinfect all or one of the detected objects:
    • To disinfect all detected objects, click the Disinfect All button.

      The application starts disinfecting detected objects. While object disinfection is in progress, the application shows a notification window where you can choose the action to be taken on the object. If you select the Apply to all checkbox in the notification window after choosing the action to be taken on the object, the application applies this action to all files of this type.

    • To disinfect one of the infected objects detected, select this object in the list and click the Disinfect button.

      The application starts disinfecting the selected object. While object disinfection is in progress, the application shows a notification window where you can choose the action to be taken on the object.

If you know for sure that File Anti-Virus is blocking files that can't harm your computer, you can include them in Trusted Zone.

Page top

[Topic kes58769]

Update application databases

Kaspersky Lab updates Kaspersky Endpoint Security application databases by using update servers. Kaspersky Endpoint Security downloads updates from Kaspersky Lab update servers, which are Kaspersky Lab HTTP servers where Kaspersky Endpoint Security updates are regularly published.

Note: An Internet connection is required to download updates from the update servers.

By default, Kaspersky Endpoint Security periodically checks for updates on Kaspersky Lab update servers. If a set of the latest updates is available on a server, Kaspersky Endpoint Security downloads the updates in the background and installs them on your computer.

Start an update of Kaspersky Endpoint Security

  1. Open the main application window and click .

    The Update window opens.

  2. Click the Update button.

You can view the results of completed update tasks in the Reports window.

Page top

[Topic kes58770]

Restore a file that has been deleted or disinfected by the application

Important: It is not recommended that you restore backup copies of files unless restoring is absolutely necessary, because doing so could lead to an infection of your computer.

Sometimes it is not possible to save files in their entirety during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can attempt to restore the original file from its backup copy.

Restore a file that has been deleted or modified by the application during disinfection

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the left pane of the Reports window, select Backup.

    The list of backed up files is displayed in the right pane of the window.

  4. In the list, select the backup copy of the file you want to restore and click the Restore button.

    A window for specifying the file name, tag, and folder to which the file will be restored opens. By default, the original file name and location are already specified.

  5. Specify the file name and folder to which the file will be restored.
  6. Click the Save button.

The application restores the file to the specified location with the specified name.

You need to scan the file for viruses immediately after restoring it. It is possible that the object can be disinfected using updated databases without becoming corrupted.

Page top

[Topic kes96813]

View the application operation report

Information about events related to File Anti-Virus, Web Anti-Virus, Network Attack Blocker, virus scan, or update tasks is displayed in the reports window.

Open the reports window

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

Page top

[Topic kes58777]

What to do if notification windows appear

Application notifications, in the form of notification windows, inform you of application events that require your attention.

If a notification appears on the screen, select one of the suggested options. The optimal option is the one that is set as the default option by Kaspersky Lab experts.

Page top

[Topic kes96925]

Computer protection scope

Objects detected by Kaspersky Endpoint Security are divided into categories based on various attributes. The application always searches for viruses, worms, Trojans, and malicious utility tools. These programs may cause significant damage to your computer. To ensure more reliable protection for your computer, you can extend the list of detectable objects by enabling the application to check for legitimate software that an intruder could exploit to damage your computer or personal data.

The objects that Kaspersky Endpoint Security protects against are grouped as follows:

  • Viruses, worms, Trojans, malicious tools. This category includes all types of malware. Protection against all types of malware ensures the minimum necessary security level. In accordance with the recommendations of Kaspersky Lab experts, Kaspersky Endpoint Security always monitors objects that belong to this category.
  • Adware. This category includes software that can inconvenience the user.
  • Auto-dialers. This category includes applications that establish phone connections through a modem in hidden mode.
  • Other applications. This category includes legitimate programs that may be used by intruders to harm the user's computer or data.

Select the categories of objects to detect

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Threats tab, in the Categories of objects to detect section, select the checkboxes next to the categories of objects to detect.

    Note: Kaspersky Endpoint Security always protects your computer against viruses, worms, Trojans, and malicious tools. Therefore, it is not possible to deselect the checkbox for this category.

Depending on the selected categories of objects to detect, Kaspersky Endpoint Security uses some or all of its application databases when running File Anti-Virus, Web Anti-Virus, and virus scan tasks.

Note: Kaspersky Lab specialists recommend that you keep protection enabled against adware and auto-dialers. If Kaspersky Endpoint Security classifies an application as malware but you believe it is safe, you can add this application to Trusted Zone.

Trusted Zone is a list of objects that Kaspersky Endpoint Security does not scan or monitor. You may need to add objects to Trusted Zone if, for example, Kaspersky Endpoint Security blocks access to a file, application folder, or website even though you are absolutely sure that this object or web address is harmless.

Add/remove a file or folder to/from the list of trusted files and folders

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Threats tab, in the Exclusions section, click the Trusted Zone button.

    The Trusted Zone preferences window opens.

  4. On the Trusted files and folders tab, edit the list of trusted files and folders:
    • To add a file or folder to the list:
      1. Click .

        The dialog where you can select a file or folder opens.

      2. Select a file or folder that you want to add.
      3. Click the Open button.
    • To remove a file or folder from the list:
      1. Select a file or folder that you want to remove from the list of trusted files and folders.
      2. Click .
  5. Click the OK button.

Add/remove a trusted web address to/from the list of trusted web addresses

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Threats tab, in the Exclusions section, click the Trusted Zone button.

    The Trusted Zone preferences window opens.

  4. On the Trusted web addresses tab, edit the list of trusted web addresses:
    • To add a web address to the list:
      1. Click .
      2. Enter the web address that you want to add to the list.
      3. Click the OK button.
    • To remove a web address from the list:
      1. Select a web address that you want to remove.
      2. Click .
  5. Click the OK button.

By default, the list of trusted web addresses is empty.

Enable monitoring of a trusted web address

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Threats tab, in the Exclusions section, click the Trusted Zone button.

    The Trusted Zone preferences window opens.

  4. On the Trusted web addresses tab, deselect the checkbox next to a web address that you want Kaspersky Endpoint Security to monitor.
  5. Click the OK button.
Page top

[Topic kes96931]

File Anti-Virus

File Anti-Virus prevents infection of the computer's file system. The component starts during startup of the operating system, remains in the computer RAM, and scans for viruses and other malware all files that are opened, saved, or run on your computer and on all connected drives. If you disable File Anti-Virus, it will not start at operating system startup. You will have to re-enable File Anti-Virus manually.

Enable/disable File Anti-Virus

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the File Anti-Virus section, select/deselect the Enable File Anti-Virus checkbox.

    You can also enable File Anti-Virus in Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when protection is disabled.

You can create a protection scope for File Anti-Virus.

Add/remove a file or folder from the protection scope

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the File Anti-Virus section, click the Protection Scope button.

    A window with a list of objects that File Anti-Virus scans opens. By default, File Anti-Virus scans all objects that are located on internal, removable, and network drives connected to your computer.

  4. Add/remove the objects to/from the protection scope:
    • To add a file or folder to the protection scope:
      1. Click .

        A drop-down list where you can select objects to add to the protection scope opens.

      2. In the drop-down list, choose the Files and Folders item.

        The window where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the protection scope.
      4. Click the Open button.
    • To remove a file or folder from the protection scope:
      1. Select an object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  5. Click the Save button.

Add/remove an object of the default protection object list from the protection scope

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the File Anti-Virus section, click the Protection Scope button.

    A window with a list of objects that File Anti-Virus scans opens. By default, File Anti-Virus scans all objects that are located on internal, removable, and network drives connected to your computer.

  4. Add/remove the objects on the list of default objects to/from the protection scope:
    • To add an object on the list of default objects to the protection scope:
      1. Click .

        A drop-down list where you can select objects to add to the protection scope opens.

      2. In the drop-down list, select an object that you want to add to the protection scope (for example, All Internal Drives).
    • To remove an object on the list of default objects from the protection scope:
      1. Select the object in the list of protection scope objects.
      2. Drag the selected object from the window or click .
  5. Click the Save button.

Disable protection of an object in the protection scope

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the File Anti-Virus section, click the Protection Scope button.

    A window with a list of objects that File Anti-Virus scans opens. By default, File Anti-Virus scans all objects that are located on internal, removable, and network drives connected to your computer.

  4. Deselect the checkbox next to an object in the list of protection scope objects.
  5. Click the Save button.

When you or an application attempt to access a file included in the protection scope, File Anti-Virus checks iSwift databases for information about the file, and uses this information to decide whether to scan the file.

Recognizing malicious objects is possible thanks to signature analysis, a way of searching for threats based on threat descriptions included in the anti-virus databases. In addition to signature analysis, File Anti-Virus uses heuristic analysis and other scanning technologies.

If a threat is detected in a file, Kaspersky Endpoint Security identifies the type of the detected malicious program (for example, virus or Trojan). After that the application displays a notification about the detected object and takes the action on the object based on your File Anti-Virus preferences.

Select the action that File Anti-Virus performs after detecting an infected file

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the File Anti-Virus section, select the action that File Anti-Virus performs after detecting an infected file.

Before attempting to disinfect or delete an infected file, Kaspersky Endpoint Security saves a backup copy for subsequent restoration or disinfection.

Information about File Anti-Virus operation and all detected objects is logged in a report.

Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Technical Support at Kaspersky Lab.

View the File Anti-Virus report

  1. Open the main application window.
  2. In the upper pane of the main application window, click the button.

    The Kaspersky Endpoint Security reports window opens.

  3. Open the File Anti-Virus tab.

Note: If File Anti-Virus stops running with an error, you can view the report and try to start the component again. If the problem is not solved, you can contact Technical Support at Kaspersky Lab.

Page top

[Topic kes58556]

Web Anti-Virus

When you use the Internet, the information on your computer is at risk of infection by viruses and other computer security threats. Computer security threats may penetrate your computer when you download free programs or visit websites that have been attacked by hackers. In addition, network worms may attack your computer as soon as your computer establishes an Internet connection, even before you open a web address or download a file.

The Web Anti-Virus component protects information that your computer sends and receives via the HTTP and HTTPS protocols in Safari, Chrome, or Firefox.

Note: Web Anti-Virus monitors web traffic on the ports most frequently used for HTTP and HTTPS data transfer.

Enable/disable Web Anti-Virus

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the Web Anti-Virus section, select/deselect the Enable Web Anti-Virus checkbox.

You can also enable Web Anti-Virus via Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs you when protection is disabled.

Important: If you have disabled Web Anti-Virus, it will not be re-enabled automatically when Kaspersky Endpoint Security starts again or when the operating system restarts. You have to re-enable Web Anti-Virus manually.

Web Anti-Virus scans web traffic based on the settings recommended by Kaspersky Lab. When Web Anti-Virus detects a threat, it performs the action that you specify. Malicious objects are recognized using signature analysis, heuristic analysis, and data from Kaspersky Security Network.

Select the action that Web Anti-Virus performs after detecting dangerous web traffic objects

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the Web Anti-Virus section, select the action that Web Anti-Virus performs after detecting dangerous web traffic objects.

Checking links on webpages for phishing threats and malicious web addresses makes it possible to avoid phishing attacks. Phishing attacks usually take the form of email messages from criminals, who pretend to be financial institutions (such as banks) and send links to fraudulent websites. In these emails, the criminals try to trick the user into visiting a phishing website and entering confidential data (such as your bank card number or the name and password for your online bank account). A phishing attack can be disguised, for example, as a message from your bank with a link to its official website, but in reality the link takes you to an exact copy of the bank's official website created by impostors.

Web Anti-Virus monitors your web traffic for attempts to visit a phishing website; it blocks access to such websites. To check links on webpages for phishing threats and malicious web addresses, Kaspersky Endpoint Security uses the application databases, heuristic analysis, and data from Kaspersky Security Network.

Web traffic scan algorithm

Each website or file that you or an application accesses via the HTTP and HTTPS protocols is intercepted and scanned for malicious code by Web Anti-Virus:

  • If a website or file contains malicious code, Kaspersky Endpoint Security can block it and display a notification that the requested file or webpage is infected.
  • If the file or website does not contain malicious code, you can access it immediately.

Information about Web Anti-Virus operation and all detected dangerous web traffic objects is logged in a report.

Note: If Web Anti-Virus stops running with an error, you can view the Web Anti-Virus report and try to restart the component. If the problem is not solved, you can contact Technical Support at Kaspersky Lab.

View the Web Anti-Virus report

  1. Open the main application window.
  2. In the upper pane of the main application window, click the button.

    The Kaspersky Endpoint Security reports window opens.

  3. Open the Web Anti-Virus tab.
Page top

[Topic kes88075]

Network Attack Blocker

Kaspersky Endpoint Security protects your computer against network attacks.

A network attack is an attempt to break into the operating system of a remote computer. Criminals attempt network attacks to establish control over the operating system, cause operating system denial of service, or access sensitive information. To achieve these goals, criminals either carry out direct attacks such as port scanning and brute force attacks, or use malware installed on a computer under attack.

Network attacks can be divided into the following types:

  • Port scanning. This type of network attack is usually performed to prepare for a more dangerous network attack. An intruder scans UDP/TCP ports that use network services on the target computer and determines the vulnerability of the target computers to other, more dangerous types of network attacks. Port scanning also enables the intruder to determine the operating system on the target computer and select appropriate network attacks for that operating system.
  • DoS attacks or network attacks causing a denial of service. Such network attacks cause the target operating system to become unstable or completely inoperable.

    The following main types of DoS attacks exist:

    • Transmission of specially designed network packets that are not expected by the target computer and therefore cause the target operating system to malfunction or crash.
    • Sending a large number of network packets to a remote computer over a short period. All of the resources of the target computer are used to process the network packets sent by the intruder. As a result, the computer stops performing its functions.
  • Network intrusion attacks. Such network attacks are designed to "hijack" the operating system of the target computer. This is the most dangerous type of network attack because, if the attack is successful, the intruder gains total control over the operating system.

    This type of network attack is used when the intruder wants to obtain confidential data from a remote computer (such as bank card numbers or passwords) or secretly use the remote computer for the intruder’s purposes (such as for attacking other computers from this computer).

Enable/disable Network Attack Blocker

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the Network Attack Blocker section, select/deselect the Enable Network Attack Blocker checkbox.

You can also enable Network Attack Blocker in Protection Center. Disabling computer protection or disabling protection components puts your computer at much higher risk of infection. This is why Protection Center informs when protection is disabled.

Important: If you have disabled Network Attack Blocker, it will not be re-enabled automatically when Kaspersky Endpoint Security starts again or after the operating system restarts. You have to re-enable Network Attack Blocker manually.

When the application detects dangerous network activity, Kaspersky Endpoint Security automatically adds the IP address of the attacking computer to the list of blocked computers, unless the attacking computer is in the list of trusted computers.

Edit the list of blocked computers

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  4. Click the Exclusions button.

    A window with a list of trusted computers and a list of blocked computers opens.

  5. Open the Blocked computers tab.
  6. If you are sure that the blocked computer is not a threat, select the IP address of the computer in the list and click the Unblock button.

    The confirmation dialog opens.

  7. In the confirmation dialog, select one of the following:
    • If you want to unblock the computer, click the Unblock button.

      Kaspersky Endpoint Security unblocks the IP address.

    • If you want Kaspersky Endpoint Security to never block the selected IP address, click the Unblock and Exclude button.

      Kaspersky Endpoint Security unblocks the IP address and adds it to the list of trusted computers.

  8. Click the Save button to save changes.

You can create and edit the list of trusted computers. Kaspersky Endpoint Security doesn't block the IP addresses of these computers automatically even after dangerous network activity is detected from them.

Edit the list of trusted computers

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Protection tab, in the Network Attack Blocker section, select the Enable Network Attack Blocker checkbox.
  4. Click the Exclusions button.

    A window with a list of trusted computers and a list of blocked computers opens.

  5. Open the Exclusions tab.
  6. Edit the list of trusted computers:
    • To add an IP address to the list of trusted computers:
      1. Click .
      2. In the field that appears, enter the IP address of the computer that you trust to be safe.
    • To remove an IP address from the list of trusted computers:
      1. Select an IP address in the list.
      2. Click .
    • To edit an IP address in the list of trusted computers:
      1. Select an IP address in the list.
      2. Click the Edit button.
      3. Change the IP address.
  7. Click the Save button to save changes.

When a network attack is detected, Kaspersky Endpoint Security logs information about the attack in a report.

Note: If the Network Attack Blocker component stops running with an error, you can view the report and try to restart the component. If the problem is not solved, you can contact Technical Support at Kaspersky Lab

View the Network Attack Blocker report

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. Open the Network Attack Blocker tab.

You can view overall statistics on protection against network attacks (number of blocked computers and number of events since last startup of the Network Attack Blocker component) in Protection Center by clicking the Details button in the right pane of the main application window.

Page top

[Topic kes58390]

Virus Scan

In addition to the real-time computer protection provided by File Anti-Virus and Web Anti-Virus, you are advised to regularly scan your computer for viruses and other computer security threats. Computer scanning is necessary to prevent the spread of malware that has not been detected by the protection components.

Kaspersky Endpoint Security contains the following built-in virus scan tasks:

  • Full Scan.

    A virus scan of memory, startup objects, and all internal drives of the computer.

  • Quick Scan.

    A virus scan of only critical areas of the computer: memory, startup objects, and system folders.

  • Custom Scan.

    A virus scan of a specified object (file, folder, drive, or removable drive).

Each scan task is performed within a specified scan scope and is started manually. Malicious objects are recognized through signature analysis. In addition to signature analysis, Kaspersky Endpoint Security uses heuristic analysis and other scanning technologies.

Start Full Scan and Quick Scan tasks

  1. Open the main application window and click  .

    The Virus Scan window opens.

  2. In the Virus Scan window, click the Full Scan or Quick Scan button.

The scan task starts.

Start a Custom Scan task

  1. Open the main application window and click  .

    The Virus Scan window opens.

  2. To start the Custom Scan task, do one of the following:
    • Drag a file or folder to the To scan files and folders, drag them onto this window pane.
    • Click the Choose button and open a file or folder.

The scan task starts.

Stop a virus scan task

  1. Open the main application window and click  .

    The Virus Scan window opens.

  2. In the Scan window, click the Stop button next to the scan task that you want to stop.

    The confirmation dialog opens.

  3. In the confirmation dialog, click the Stop button.

The scan task stops.

You can also configure the Full Scan and Quick Scan tasks to run automatically according to a specified schedule.

Configure Full Scan and Quick Scan schedule preferences

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab, in the list on the left, select Full Scan or Quick Scan.
  4. In the Schedule section, select a checkbox corresponding to a configured schedule for the selected virus scan task.
  5. To change the virus scan task schedule, click the Schedule button.

    A window opens, in which you can configure the virus scan task schedule.

  6. Specify the virus scan task launch frequency and time.
  7. Click the Save button to save changes made to the virus scan task schedule.

The Full Scan and Quick Scan tasks already contain scan scopes. While performing the Full Scan task, Kaspersky Endpoint Security scans memory, startup objects, and all internal drives of the computer. While performing the Quick Scan task, Kaspersky Endpoint Security scans computer memory, startup objects, and system folders. You can change the scan scope of the Full Scan and Quick Scan tasks.

Add/remove a file or folder to/from the scan scopes of the Full Scan and Quick Scan tasks

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  4. In the Scan scope section, click the Edit button.

    A window with the list of Full Scan or Quick Scan task scan scope objects opens.

  5. Edit the list of scan scope objects:
    • To add a file or folder to the scan scope:
      1. Click the button.

        A drop-down list where you can select objects to add to the scan scope opens.

      2. In the drop-down list, choose the File or Folder item.

        A dialog where you can select a file or folder opens.

      3. Select a file or folder that you want to add to the scan scope.
      4. Click the Open button.
    • To remove a file or folder from the scan scope:
      1. Select an object that you want to remove.
      2. Drag the selected object from the window or click the button.
  6. Click the Save button.

Add an object from the default list of Full Scan and Quick Scan objects to the scan scope

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.
  3. The application preferences window opens.

  4. On the Virus Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  5. In the Scan scope section, click the Edit button.

    A window with the list of objects in the scan scope opens.

  6. Click the button.

    A drop-down list where you can select objects to add to the scan scope opens.

  7. In the drop-down list, select an object that you want to add to the scan scope (for example, Memory).
  8. Click the OK button.

Disable protection of an object in the Full Scan or Quick Scan task scan scope

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.
  3. The application preferences window opens.

  4. On the Virus Scan tab, in the list on the left, select the Full Scan or Quick Scan task.
  5. In the Scan scope section, click the Edit button.

    A window with the list of scan scope objects opens.

  6. Deselect the checkbox next to the object in the list of scan scope objects.
  7. Click the OK button.

For each scan task you can choose one of the preset security levels:

  • Maximum protection – a security level ensuring a full scan of the entire computer or individual disks, folders, or files. This security level is recommended when you suspect that the computer is infected.
  • Recommended – a security level with the preferences recommended by Kaspersky Lab.
  • Maximum speed – this security level enables you to use other applications that require significant system resources, since the scope of files scanned at this security level is smaller.

By default, virus scan tasks are performed at the Recommended security level. You can increase or decrease the thoroughness of the scan by selecting Maximum protection or Maximum speed, respectively. You can also edit the preferences of the current security level. This will change the name of the security level to Custom.

Select the security level

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab, select the name of the virus scan task in the task list on the left.
  4. In the Security level section, move the slider to the required position.

    Changing the security level changes the balance between scan speed and the total number of files scanned: the fewer files scanned for viruses, the higher the scan speed.

Edit the preferences of the current security level

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.
  3. The application preferences window opens.

  4. On the Virus Scan tab in the application preferences window, select the name of the virus scan task in the task list on the left.
  5. In the Security level section, click the Preferences button.

    A window opens, in which you can edit the preferences of the current security level.

  6. In the window that opens, edit the security level preferences:
    • In the File types section, select the types of files that should be scanned by Kaspersky Endpoint Security when running the virus scan task.
    • In the Optimization section, select or deselect checkboxes and specify the relevant values in the entry fields to configure the preferences for scan performance and use of iSwift technology.
    • In the Compound files section, select or deselect checkboxes next to the types of compound files to be scanned.
    • In the Heuristic analyzer section, select or deselect the Use Heuristic Analyzer checkbox. If the checkbox is selected, move the slider up or down the scale to select the level of heuristic analysis during virus scan tasks.
  7. Click OK to save changes made to the security level preferences.

Restore default scan preferences

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab in the application preferences window, select the name of the virus scan task in the task list on the left.
  4. In the Security level section, click the Default button.

    This restores the recommended virus scan task preferences. The name of the security level changes to Recommended.

     

Upon detecting an infected object, the application displays a notification prompting the user to select the action to be taken on the object. You can modify the action to perform when an object is detected.

If a threat is detected in a file, Kaspersky Endpoint Security identifies the type of the detected malicious program (for example, virus or Trojan).

Select the action to take on objects during scanning

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Virus Scan tab, select the name of the virus scan task in the task list on the left.
  4. In the Action section, select the action for Kaspersky Endpoint Security to perform on the detected malicious object.

Before disinfecting or deleting an infected file, Kaspersky Endpoint Security saves a copy of it in Backup so you can restore the original file, if necessary.

Information about the results of virus scan tasks and all detected objects is logged in a virus scan task report.

View the virus scan task report

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the reports window that opens, in the Tasks section, select Virus Scan.

Note: If any errors occur while running a virus scan task, start the task again. If the new attempt to run the scan also results in an error, contact Kaspersky Lab Technical Support.

Page top

[Topic kes58397]

Update tasks

Timely updates of application databases ensure that your computer remains protected. File Anti-Virus, Web Anti-Virus and virus scan tasks use application databases to detect and neutralize malware on your computer. Application databases are updated regularly with new threats and ways to neutralize them, so it is important that you update the databases.

By default, Kaspersky Endpoint Security downloads application databases and new application modules from Kaspersky Lab update servers and installs them on your computer.

Start an application database update

  1. Open the main application window and click .
  2. The Update window opens.

  3. Click the Update button.

Dedicated Kaspersky Lab update servers are the main source of updates for Kaspersky Endpoint Security. You can also use Kaspersky Security Center servers, local folders, or other web servers as an update source.

Select an update source

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Application section, click the Preferences button.

    A window opens, in which you can select the update sources.

  5. On the Update sources tab, select the checkboxes next to the update sources that you want to use.

    Note: By default, the list of update sources contains only Kaspersky Lab update servers and Kaspersky Security Center servers. When running an update, Kaspersky Endpoint Security refers to the list of update sources for the address of the first server and attempts to download the updates from this server. If the updates cannot be downloaded from the selected server, the application tries to connect and retrieve the updates from the next server. This continues until a connection is successfully established or all the available update servers have been tried. For subsequent updates the application first tries to access the server from which the most recent update was successfully made.

    You can perform the following actions:

    • Add a new update source to the list.

      Click the button and select the most suitable option from the dropdown list:

      • To add a local or network folder as an update source, select Add folder. Select the required folder in the Finder window that opens.
      • To add a web resource as an update source, select Add web address. In the window that opens, enter the server's web address in the Web address of update source field.
    • Change the update source.

      Select an update source in the list by double-clicking and make changes.

      Note: Kaspersky Lab update servers and Kaspersky Security Center servers are update sources that cannot be edited or deleted.

    • Temporarily disable retrieval of updates from the source.

      Deselect the checkbox next to an update source that you want to disable. Kaspersky Endpoint Security will not be updated from this source until the checkbox is selected again.

    • Delete an update source (available only for update sources added by the user).

      Select the update source in the list and click the button.

  6. Click the Save button to save the changes made to the update preferences.

Note: An Internet connection is required to download an update package from update servers. If you connect to the Internet via a proxy server, you may need to configure the network preferences.

Application database updates can be downloaded in one of the following modes:

  • Automatically. Kaspersky Endpoint Security periodically checks for updates on Kaspersky Lab update servers. During a virus outbreak the frequency of these checks may increase and then decrease afterwards. If a set of the latest updates is stored on a server, Kaspersky Endpoint Security downloads them in the background and installs them on your computer. This is the default update mode.
  • Manually. In this case, you start updates of Kaspersky Endpoint Security manually.
  • By schedule. Kaspersky Endpoint Security is automatically updated according to a schedule.

By default, Kaspersky Endpoint Security module updates are downloaded and installed on the computer automatically.

Select the Kaspersky Endpoint Security update mode

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Application databases section, select one of the options:
    • If you want anti-virus databases and application modules to be automatically downloaded from Kaspersky Lab update servers and installed, select the Download updates automatically option.
    • To start the application update process manually, select the Download updates manually option.
    • If you want the application update to start automatically according to a schedule you specify, select the option corresponding to the update schedule.

Configure a Kaspersky Endpoint Security update schedule

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Application databases section, select the option corresponding to a configured application update schedule.
  5. Click the Schedule button.

    A window opens, in which you can configure the update schedule.

  6. Specify the application update frequency and time.
  7. Click the Save button to save changes made to the application update startup schedule.

During an update the application databases and modules are compared with those currently available at the update source. If the latest version of the databases is installed on your computer, the Update window or Protection Center display a message to inform you that the application databases are up-to-date. If the application version and application databases differ from those currently available from the update source, then only the missing update components are installed on your computer. Application databases are not copied in their entirety, which increases update speed and reduces Internet traffic.

Disable automatic download and installation of updates of application modules on the computer

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Application section, deselect the Update application modules checkbox.

    Note: If at the time of the update both application databases updates and application modules updates are available from the update source, Kaspersky Endpoint Security downloads the application module updates and installs them after the computer is restarted. The downloaded application module updates are not installed until the computer restarts. If the next application update becomes available on Kaspersky Lab servers before the computer is restarted and before the previously downloaded application module updates are installed, then Kaspersky Endpoint Security only updates the application databases.

If you connect to the Internet via a proxy server, you can configure the proxy server connection preferences. Kaspersky Endpoint Security uses these preferences to update application databases and download application module updates.

Configure a connection to a proxy server

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Proxy section, select the Use proxy server checkbox and click the Preferences button.

    A window opens, in which you can configure the proxy server connection preferences.

  5. Configure the connection to a proxy server.
  6. Click the Save button to save the changes made to the proxy server connection preferences.

Before updating the application databases Kaspersky Endpoint Security creates backup copies of them so a rollback can be performed, if necessary. The rollback feature is useful if a new version of the application databases contains an incorrect signature that makes Kaspersky Endpoint Security block a safe application.

Note: If Kaspersky Endpoint Security databases become corrupted, you are advised to start an update to download and install the latest version of application databases.

Roll back the last update

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Rollback section, click the Roll Back Update button.

While updating Kaspersky Endpoint Security you can copy the downloaded updates to a local source. You can use a local copy of downloaded updates to update application databases and modules of Kaspersky Endpoint Security on other computers on the corporate network in order to reduce the amount of Internet traffic.

You can set up update distribution as follows:

  1. One of the computers on the network receives the Kaspersky Endpoint Security update package from Kaspersky Lab update servers or a different update source. The updates retrieved are placed in a shared folder.

    Note: The shared folder must be created in advance.

  2. Other computers on the network refer to the shared folder as the update source.

    Distribution of updates via a local computer

Enable copying of updates to a local folder

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. Select the Update tab.
  4. In the Application section, click the Preferences button.

    A window opens, in which you can enable copying of updates to a local folder.

  5. On the Advanced tab, select the Copy update files to folder checkbox and click the Select button.

    The Finder window opens.

  6. In the Finder window, select a shared folder to which Kaspersky Endpoint Security will save the updates.
  7. Click the Save button to save the changes made to the update preferences.

Information about the progress of the current update task (percent complete) is shown in the lower part of the Update window and also in the main application window and in Protection Center.

Detailed information about the results of the Update task is logged in the update task report.

View the update task report

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the Tasks section, select the Update task.
Page top

[Topic kes59231]

Backup

Sometimes the integrity of infected files cannot be preserved during the disinfection process. If a disinfected file contained important information that is partly or completely inaccessible following disinfection, you can restore the original file from Backup.

A backup copy is a copy of a dangerous file that is created when the file is disinfected or deleted. It is stored in Backup.

Backup is a special storage area that contains backup copies of files that have been deleted or modified during disinfection. The main function of Backup is enabling the user to restore an original file at any time. Files in Backup are saved in a special format and are not dangerous for the computer.

View the contents of Backup

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the left pane of the Reports window, select Backup.

The list of backed up files is displayed in the right pane of the window.

You can restore or remove backup copies of files from Backup.

Restore a backup copy of a file from Backup

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the left pane of the Reports window, select Backup.

    The list of backed up files is displayed in the right pane of the window.

  4. In the list, select the backup copy of the file you want to restore and click the Restore button.

    A window for specifying the file name, tag, and folder to which the file will be restored opens. By default, the original file name and location are already specified.

  5. Specify the file name and folder to which the file will be restored.
  6. Click the Save button.

The application restores the file to the specified location with the specified name.

You need to scan the file for viruses immediately after restoring it. It is possible that the object can be disinfected using updated databases without becoming corrupted.

Important: It is not recommended that you restore backup copies of files unless restoring is absolutely necessary, because doing so could lead to an infection of your computer.

Remove a backup copy of a file from Backup

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the left pane of the Reports window, select Backup.

    The list of backed up files is displayed in the right pane of the window.

  4. Select the backup copies you want to delete in the list of backup copies:
    • To delete one or more backup copies of files, select the backup copies you want to delete and click the Delete button.
    • To delete all backup copies, click the Delete All button.

By default, the storage term for files in Backup is 30 days. When this term expires the files are deleted. You can change the maximum Backup storage period for files or remove the limit on the storage period.

Configure the storage period for files in Backup

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Reports tab, in the Backup section, select the Delete objects after <number> days checkbox and specify the time period after which files stored in Backup are automatically deleted.
Page top

[Topic kes59232]

Reports

You can view a Kaspersky Endpoint Security report listing all detected objects. Additionally, a separate detailed report is created for each of the following application components: File Anti-Virus, Web Anti-Virus, Network Attack Blocker, virus scan and update tasks.

Open the Reports window

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

Kaspersky Endpoint Security can save reports in text format. This functionality may be useful if File Anti-Virus, Web Anti-Virus, Network Attack Blocker, a virus scan task, or the update task results in an error that you can't fix on your own and you need assistance from Kaspersky Lab Technical Support. In this case, send a text report to Kaspersky Lab Technical Support so our specialists can study the problem and fix it as quickly as possible.

Export a report on a Kaspersky Endpoint Security component or task to a text file

  1. Open the main application window.
  2. On the navigation panel in the upper part of the main application window, click the button.

    The Reports window opens.

  3. In the left pane of the reports window, select the required report tab.
  4. In the lower-left corner, click the Export button.
  5. In the window that opens, specify the file name, tags, and destination folder for the report.
  6. Click the Save button.

By default, Kaspersky Endpoint Security doesn't log informational events in reports. You can allow logging of informational events.

Enable logging of informational events in reports

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Reports tab, in the Reports section, select the Log non-critical events checkbox.
Page top

[Topic kes159877]

FileVault disk encryption

Note: The FileVault disk encryption feature will be available in Kaspersky Security Center 10 SP3. For more information, contact Kaspersky Lab Technical Support.

Kaspersky Endpoint Security allows managing FileVault encryption remotely. Encryption prevents other users from unauthorized access to sensitive data stored on the startup disk of the user's computer.

When an administrator starts FileVault encryption of a computer from Kaspersky Security Center, Kaspersky Endpoint Security prompts a user of this computer to enter his or her credentials. Disk encryption only starts after the user provides the credentials and the computer is restarted.

Note: If FileVault encryption management isn't enabled in Kaspersky Security Center, users with administrator rights can encrypt and decrypt their Mac startup disks from System Preferences. For more information on FileVault, refer to Apple's documentation.

If the computer has multiple computer accounts, FileVault encryption makes the disk inaccessible to all users except for the user who entered the credentials.

Allow other users to unlock the disk

  1. Choose Apple menu > System Preferences, then click Security&Privacy.
  2. On the FileVault tab, at the bottom of the window, click the lock.
  3. In the prompt for administrator credentials, enter the user name and password.
  4. Click the Enable Users button.
  5. In the window that opens, select a user to authorize to unlock the computer and click the Enable User button next to his or her name.
  6. In the window that opens, enter the password of the user's computer account and click the OK button.
  7. Click the Done button.

The user can access the encrypted disk.

Note: Administrator rights are required to allow other users to unlock the disk.

Page top

[Topic kes59237]

Participate in Kaspersky Security Network

When you participate in Kaspersky Security Network, Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac. To increase the reliability of protection on your computer, Kaspersky Endpoint Security uses data provided by users from all over the world. A network named Kaspersky Security Network is designed to analyze such data.

Kaspersky Security Network (KSN) is an infrastructure of cloud services that provides access to the Kaspersky Lab database with constantly updated information about the reputation of files, websites, and software. Use of data from Kaspersky Security Network ensures that Kaspersky Lab applications respond faster to threats, improves the performance of some protection components, and reduces the risk of false positives.

When you participate in Kaspersky Security Network, Kaspersky Endpoint Security statistics are automatically sent to Kaspersky Lab to enhance protection of your Mac.

Note: Kaspersky Lab doesn't collect, process, or store any personal data.

Participation in Kaspersky Security Network is voluntary. The decision to participate is made when you install Kaspersky Endpoint Security. However, you can change your decision later at any time.

Enable Kaspersky Security Network

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the KSN tab, in the KSN provider section, click the Show KSN Statement button to view the Kaspersky Security Network Statement.
  4. If you accept all of the provisions of the Statement, select the I agree to participate in Kaspersky Security Network checkbox.
Page top

[Topic kes123251]

Manage the application from the command line

You can manage Kaspersky Endpoint Security from the command line.

Note: After updates of Kaspersky Endpoint Security modules are installed, the version of the application client in the command line may differ from the installed version of the application.

Command line syntax:

kav <command> <parameters>

Use this command to view the application command line syntax:

kav -? | help

To get help on the syntax of a specific command, you can use one of the following commands:

kav <command> -?

kav help <command>

Each command has its own range of supported parameters.

Page top

[Topic kes26819]

View Help

Use this command to view the application command line syntax:

kav -? | help

To get help on the syntax of a specific command, you can use one of the following commands:

kav <command> -?

kav help <command>

Page top

[Topic kes26820]

Run virus scan

The text of the command to start a virus scan of a specific area has the following general format:

kav scan <scan scope> <action> <file types> <exclusions> <report parameters> <advanced parameters>

Note: To run a virus scan, you can also use tasks created in the application by starting one from the command line. The task is started with the parameters that are specified in the Kaspersky Endpoint Security interface.

Parameter descriptions

<scan scope> – This parameter specifies a list of objects that are to be scanned for malicious code. The parameter may include several values (separated by a space) from the following list:

  • <files> – List of paths to files and/or folders to be scanned. You can enter an absolute or relative path. Items in the list are separated by a space.

    Note: If the name of an object or the path to it includes a space or special characters (such as $, &, or @), the name should be encased in single quotes (' '), or each of the special characters should be escaped by adding a backslash (\) immediately before it.

    If reference is made to a specific folder, all files and folders in this folder are scanned.

  • -all – Full scan of your computer
  • -remdrives – All removable drives
  • -fixdrives – All internal drives
  • -netdrives – All network drives
  • -@:<filelist.lst> – Path to the file with a list of objects and folders within the scan scope. The file must be in text format and each scan object must be listed in a separate line. Only an absolute path to the file may be entered.

<action> – This parameter determines the action to take on malicious objects that are detected during the scan. If this parameter is not defined, the default action is the one corresponding to the value -i8. The following values are possible:

  • -i0 – Take no actions on the object, only save information about the object in a report.
  • -i1 – Disinfect infected objects, skip them if they cannot be disinfected.
  • -i2 – Disinfect infected objects, delete them if they cannot be disinfected; do not delete containers, except for those with executable headers (.sfx archives).
  • -i3 – Disinfect infected objects, delete them if they cannot be disinfected; delete containers completely if infected files inside them cannot be deleted.
  • -i4 – Delete infected objects; delete containers completely if infected files inside them cannot be deleted.
  • -i8 – Prompt the user for action if an infected object is detected (used by default).
  • -i9 – Prompt the user for action when the scan is completed.

<file types> – This parameter defines the file types that are subject to virus scan. By default, if this parameter is not defined, only infectable files (based on the file contents) are scanned. The following values are possible:

  • -fe – Scan only infectable files by extension.
  • -fi – Scan only infectable files by content (used by default).
  • -fa – Scan all files.

<exclusions> – This parameter defines the objects to exclude from scanning. You can include several parameters from the list below, separating them with a space:

  • -e:a – Do not scan archives.
  • -e:b – Do not scan email databases.
  • -e:m – Do not scan email messages in text format.
  • -e:<mask> – Do not scan objects by mask.
  • -e:<seconds> – Skip objects that are scanned for longer than the specified length of time (in seconds).
  • -es:<size> – Skip objects with size larger than the specified value (in megabytes).

<report parameters> – These parameters define the format of the report containing the scan results. You can use an absolute or relative path to the file for saving the report. If this parameter is not defined, scan results are displayed and all events are shown.

  • -r:<report file> – Log only important events to the specified report file.
  • -ra:<report file> – Log all events to the specified report file.

<advanced parameters> – Parameters that define the use of virus scan technologies and configuration files:

  • -iSwift=<on|off> – Enable/disable the use of iSwift.
  • -c:<configuration file> – Define the path to the configuration file that contains the application preferences for virus scan tasks. You can enter an absolute or relative path to the file. If this parameter is not specified, the values set in the application interface are used together with the values that are already specified in the command line.

Example:

Start scan of the folders ~/Documents, /Applications, and the file named my test.exe:

kav scan ~/Documents /Applications 'my test.exe'

Scan the objects listed in the file object2scan.txt. Use the scan_settings.txt configuration file. When the scan is complete, create a report to log all events:

kav scan -@:objects2scan.txt -c:scan_settings.txt -ra:scan.log

A sample configuration file:

-netdrives -@:objects2scan.txt -ra:scan.log

Page top

[Topic kes26821]

Update the application

Command syntax:

kav update <update source> -app=<on|off> <report parameters> <advanced parameters>

Parameter descriptions

<update source> – An HTTP server or a network or local folder from which updates are downloaded. If a path is not selected, the update source will be taken from the application update preferences.

-app=<on|off> – Enable/disable updates of application modules.

<report parameters> – These parameters define the format of the report on the scan results. You can use an absolute or relative path to the file. If this parameter is not defined, update results are displayed and all events are shown. The following values are possible:

  • -r:<report file> – Log only important events to the specified report file.
  • -ra:<report file> – Log all events to the specified report file.

<advanced parameters> – A parameter that defines use of a configuration file.

-c:<configuration file> – Defines the path to a configuration file that contains the application preferences for updating the application. You can enter an absolute or relative path to the file. If this parameter is not defined, the values set in the application interface are used.

Example:

Update the application databases from the default source, logging all events in the report:

kav update -ra:avbases_upd.txt

Update the Kaspersky Endpoint Security modules using the parameters of the updateapp.ini configuration file:

kav update -app=on -c:updateapp.ini

Page top

[Topic kes26828]

Roll back the last update

Command syntax:

kav rollback <report parameters>

Important: Administrator rights are required to run this command.

Parameter descriptions

<report parameters> – This parameter defines the format of the report containing the results of the update rollback. You can use an absolute or relative path to the file. If this parameter is not defined, rollback results are displayed and all events are shown.

  • -r:<report file> – Log only important events to the specified report file.
  • -ra:<report file> – Log all events to the specified report file.

Example:

kav rollback -ra:rollback.txt

Page top

[Topic kes59643]

Start/stop a component or task

The start command syntax:

kav start <task or component name> <report parameters>

The stop command syntax:

kav stop <task or component name>

Important: Administrator rights are required to run the stop command.

Parameter descriptions

<task or component name> – Specify one of the following values:

  • fm or file_monitoring – File Anti-Virus
  • wm or web_monitoring – Web Anti-Virus
  • ids – Network Attack Blocker
  • full or scan_my_computer – Full Scan task
  • scan_objects – Custom Scan task
  • quick or scan_critical_areas – Quick Scan task
  • updater – Update task
  • rollback – Rollback task

<report parameters> – These parameters define the format of the report on the component or task results. You can use an absolute or relative path to the file. If this parameter is not defined, Kaspersky Endpoint Security displays results in accordance with parameters configured in the graphical user interface.

Note: <report parameters> is only available for scan_objects, updater, and rollback values.

The following values are possible:

  • -r:<report file> – Kaspersky Endpoint Security logs only important events to the specified report file.
  • -ra:<report file> – Kaspersky Endpoint Security logs all events to the specified report file.

Note: Components and tasks started from the command prompt are run with the parameters configured in the graphical user interface.

Example:

To enable the File Anti-Virus component, enter the following command in the command line:

kav start fm

To stop the Full Scan task from the command line, enter the following command:

kav stop scan_my_computer

Page top

[Topic kes26830]

View status and statistics of a component or task

The status command syntax:

kav status <task or component name>

The statistics command syntax:

kav statistics <task or component name>

Parameter descriptions

<task or component name> – Specify one of the following values:

  • fm or file_monitoring – File Anti-Virus
  • wm or web_monitoring – Web Anti-Virus
  • ids – Network Attack Blocker
  • full or scan_my_computer – Full Scan task
  • scan_objects – Custom Scan task
  • quick or scan_critical_areas – Quick Scan task
  • updater – Update task
  • rollback – Rollback task

Note: If the status command is run without specifying a value for the <task or component name> parameter, the current status of all tasks and components of the application is displayed. For the statistics command, a value must be specified for the <task or component name> parameter.

Page top

[Topic kes26831]

Export protection preferences

Command syntax:

kav export <task or component name> <export file>

Parameter descriptions

<task or component name> – Specify one of the following values:

  • fm or file_monitoring – File Anti-Virus
  • wm or web_monitoring – Web Anti-Virus
  • ids – Network Attack Blocker
  • full or scan_my_computer – Full Scan task
  • scan_objects – Custom Scan task
  • quick or scan_critical_areas – Quick Scan task
  • updater – Update task
  • rollback – Rollback task

<export file> – Path to the file to which the application preferences are exported. An absolute or relative path may be specified.

Example:

kav export fm fm_settings.txt

Page top

[Topic kes26822]

Activate the application

You can activate Kaspersky Endpoint Security by applying a key file.

Command syntax:

kav addkey <key file or key activation code>

Parameter descriptions

<key file> – application key file with .key extension.

<key activation code> - activation code in XXXX-XXXX-XXXX-XXXX format.

Example:

kav addkey ./1AA111A1.key

kav addkey A11A1-11111-1A1AA-1A11A

Page top

[Topic kes26827]

Return codes of the command line

The general codes may be returned by any command from the command line. The return codes include general codes as well as codes specific to a certain task.

Syntax of the command for receiving the return code:

echo $?

General return codes:

  • 0 – Operation completed successfully
  • 1 – Invalid parameter value
  • 2 – Unknown error
  • 3 – Task completion error
  • 4 – Task canceled

Virus scan task return codes:

  • 101 – All malicious objects processed
  • 102 – Malicious objects detected
Page top

[Topic kes26824]

Quit the application

Command syntax:

kav exit

Important: Administrator rights are required to run this command.

Page top

[Topic kes127598]

Manage the application via Kaspersky Security Center

Kaspersky Security Center is designed for centralized management of corporate network security. For detailed information about Kaspersky Security Center, see Kaspersky Security Center Help.

You can also manage Kaspersky Endpoint Security via the graphical user interface of the application and the command line.

In this section

Deploy Kaspersky Endpoint Security on a corporate network

Prepare for remote installation of Kaspersky Endpoint Security

Manage Network Agent from the command line

Install and uninstall Kaspersky Endpoint Security

Start and stop the application via Kaspersky Security Center

Create and manage tasks

Create and manage policies

Create and manage policy profiles

Generate a report on detected objects

Page top

[Topic kes127599]

Deploy Kaspersky Endpoint Security on a corporate network

This section describes a typical Kaspersky Endpoint Security deployment within an organization.

Deploy Kaspersky Endpoint Security on a corporate network

  1. Deploy Administration Server on the network.

    Administration Server is a component of Kaspersky Security Center that centrally stores information about all Kaspersky Lab applications that are installed within the corporate network and to manage these applications.

  2. Install Administration Console on the Kaspersky Security Center administrator's workstation.

    Administration Console is a component of Kaspersky Security Center that provides a user interface for the administrative services of Administration Server and Network Agent.

  3. Install the Kaspersky Endpoint Security administration plug-in on the Kaspersky Security Center administrator's workstation.

    An administration plug-in is a dedicated component that provides an interface for managing Kaspersky Lab applications through Administration Console. Each application has its own administration plug-in. The administration plug-in is provided for all Kaspersky Lab applications that can be managed from Kaspersky Security Center.

  4. Install Network Agent on remote Mac computers in one of the following ways:
  5. Install Kaspersky Endpoint Security on remote Mac computers in one of the following ways:

    Important: If Kaspersky Internet Security for Mac or third-party anti-virus software is installed on remote computers, uninstall them before installing Kaspersky Endpoint Security.

For detailed information on deployment of Administration Server and installation of Administration Console, see the Kaspersky Security Center Implementation Guide.

Page top

[Topic kes127602]

Prepare for remote installation of Kaspersky Endpoint Security

This section contains information about installation of the Kaspersky Endpoint Security administration plug-in on the Kaspersky Security Center administrator's workstation and installation of Network Agent on the remote computer.

Installation of the Kaspersky Endpoint Security administration plug-in and Network Agent is a prerequisite for installation of Kaspersky Endpoint Security via Kaspersky Security Center.

In this section

Install the Kaspersky Endpoint Security administration plug-in

Install Network Agent locally

Install Network Agent via Kaspersky Security Center

Install Network Agent using the SSH protocol

Page top

[Topic kes127601]

Install the Kaspersky Endpoint Security administration plug-in

The Kaspersky Endpoint Security administration plug-in provides an interface for managing Kaspersky Endpoint Security through Administration Console.

Install the Kaspersky Endpoint Security administration plug-in

  1. On the Kaspersky Security Center administrator's workstation, unpack the archive with the files of the Kaspersky Endpoint Security installation package.
  2. Open the folder with the files of the Kaspersky Endpoint Security installation package.
  3. Double-click klcfginst.exe.

Installation of the Kaspersky Endpoint Security administration plug-in starts.

Important: Before installing the Kaspersky Endpoint Security administration plug-in, close Administration Console on the Kaspersky Security Center administrator's workstation.

Page top

[Topic kes127603]

Install Network Agent locally

Network Agent coordinates the interaction between Administration Server and Kaspersky Endpoint Security installed on computers within the corporate network.

Install Network Agent locally

  1. On the remote computer, open the folder with the Network Agent distribution kit.
  2. Open the Network Agent distribution kit (.dmg file).

    A window with the contents of the distribution kit opens.

  3. In the window with the contents of the distribution kit, double-click Kaspersky Network Agent.
  4. Confirm that you want to install Network Agent by clicking Continue.
  5. In the Introduction window, click Continue.
  6. In the License window, read the text of the Network Agent End User License Agreement between you and AO Kaspersky Lab and do the following:
    • To accept all the terms of the agreement and proceed with the installation, click the Continue button.
    • To print the text of the agreement, click the Print button.
    • To save the agreement as a text file, click the Save button.
  7. In the confirmation window, do one of the following:
    • To proceed with the installation of Network Agent, click the Agree button.
    • To return to the text of the End User License Agreement, click the Read License button.
    • To cancel the installation, click the Disagree button.
  8. In the Preferences window, do the following:
    1. In the Server field, specify the IP address or DNS name of the server on which Kaspersky Security Center is installed.
    2. In the Port field, specify the port number for an unencrypted connection to the server.
    3. In the SSL Port field, specify the port number for an SSL connection to the server.
    4. If you want to launch Network Agent immediately after installation, select the Run after installation checkbox.

    If you do not want to use SSL to connect to the server, deselect the Use SSL checkbox. To proceed with the installation, click the Continue button.

  9. In the Installation Type window, read the information about the drive on which Network Agent will be installed.

    To install Network Agent using the recommended settings, click the Install button and enter the administrator's password to confirm your choice.

    Wait until the Network Agent installer finishes installing the application components.

  10. Click the Close button to quit the installer.
Page top

[Topic kes159648]

Install Network Agent via Kaspersky Security Center

Kaspersky Security Center installs Network Agent on a client computer using an SSH connection.

Before installing Network Agent on a client computer, make sure that the following conditions are met:

  • Kaspersky Security Center Administration Server is deployed on the corporate network.
  • Administration Console is installed on the Kaspersky Security Center administrator's workstation.
  • Remote Login is enabled on remote computers.
  • A dedicated administrator account that will be used to run the remote installation task is created on a remote computer. You can use a domain account for the installation.
  • The sudo password is disabled for the dedicated account.

Create a Network Agent installation package

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. In the console tree, select the Advanced folder, then Remote installation subfolder, and then the Installation packages subfolder.
  4. In the workspace, click the Create installation package button.
  5. In the Select installation package type window, click Create an installation package for Kaspersky Lab application.
  6. In the Defining installation package name window, type the name of the new installation package in the Name field and click Next.
  7. In the Selecting the distribution package for installation window, click the Browse button.
  8. The window for selecting a file for creating the installation package opens.
  9. Open the folder with the contents of the Network Agent installation package and select the klnagent.kud file.

    The Selecting the distribution package for installation window shows the name and version of the application to be installed remotely using the file that has been added.

  10. Click Next.

    The Kaspersky Endpoint Security installation package is created with the specified settings.

  11. In the last window of the wizard, click the Finish button to exit the New Package Wizard.

Create a task for remote installation of Network Agent on a client computer

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. Select the Tasks folder.
  4. In the workspace, start the New Task Wizard by clicking the Create a task button.
  5. Follow the steps of the New Task Wizard below to create a task for remote installation of Kaspersky Endpoint Security on the client computer.

To proceed to the next step of the wizard, click the Next button. To return to the previous step of the wizard, click the  button. To exit the wizard at any step, click the Cancel button.

The appearance of buttons may vary depending on your version of Windows.

Step 1. Select the task type

  1. In the Select the task type window, maximize the Kaspersky Security Center 10 Administration Server node.
  2. Select the Install application remotely task.

Step 2. Select the installation package

  1. In the Select installation package window, do one of the following:
    • If the Network Agent installation package with the required settings has been created previously, select it in the list of installation packages in the upper part of the Select installation package window.
    • If the required installation package has not been created yet, click New to start the New Package Wizard.

Step 3. Configure the installation settings

  1. Select the Using operating system resources by means of Administration server checkbox.
  2. Deselect all other checkboxes.

Step 4. Select an administration group to add computers to after installation

In the Moving to the list of managed computers window, select a group to which computers will be moved after installation if necessary.

Step 5. Define how to select the client computers for which the task will be created

In the Select devices to which the task will be assigned window, select the method you want to use to specify client computers:

  • To select from among computers detected on the network by Administration Server, select the Select networked devices detected by Administration Server option.
  • To specify the IP addresses of computers manually or import the IP addresses of computers from a file, select the Specify device addresses manually, or import addresses from list option.
  • To create a task for a selection of devices based on a preset criterion, select the Assign task to a device selection option.
  • To select computers from a specific administration group, select the Assign task to an administration group option.

Step 6. Select client computers

In the window that opens (Select devices, Device selection, or Select Administration group, depending on the option you selected in the previous step), select the client computers, specify the IP addresses of computers, specify a computer selection, or select the administration group to which the task will be applied.

Step 7. Select the account to run the task

  1. In the Selecting an account to run the task window, select the Account required (for installation without Network Agent) checkbox.
  2. Click the Add button.

    The Account window opens.

  3. Specify the login and password of the dedicated administrator account of a remote computer.
  4. Click OK.

Step 8. Configure the task schedule

  1. In the Configure task scheduling settings window, select the start mode in the Scheduled start drop-down list.
  2. If necessary, configure a scheduled task to start automatically (by specifying the task start date and time).
  3. If you want to run tasks that the application was unable to start according to schedule (for example, because the computer was turned off at the scheduled time), select the Run missed tasks checkbox.

    Kaspersky Endpoint Security starts the task as soon as the obstacle preventing the task from being started is eliminated.

Step 9. Specify the task name

In the Define the task name window, in the Name field, enter the name of the task you are creating.

Step 10. Finish creating the task

In the Finishing creating the task window, do the following:

  1. If you want the task to start as soon as the wizard is finished, select the Run task after Wizard finishes checkbox.
  2. Click the Finish button to close the wizard.
Page top

[Topic kes127621]

Install Network Agent using the SSH protocol

One way to install Network Agent on a remote computer is by using the SSH protocol.

Make sure that the following requirements are met:

  • Kaspersky Security Center Administration Server is deployed on the corporate network.
  • Administration Console is installed on the Kaspersky Security Center administrator's workstation.
  • The Network Agent installation package is created and stored in a shared folder of Administration Server.
  • Remote Login is enabled on the remote computer.
  • The computer account used to install Network Agent is included in sudoers.

For detailed information about installation packages, see Kaspersky Security Center Help.

Install Network Agent using the SSH protocol

  1. Start the SSH client on the administrator's workstation.
  2. Connect to the remote computer.
  3. Connect the shared folder of Administration Server as a network drive on the remote computer. To do this, enter the following commands in the SSH client:

    mkdir /Volumes/KLSHARE

    mount_smbfs //<administrator account>:<password>@<Administration Server IP address>/KLSHARE /Volumes/KLSHARE

    Parameter descriptions:

    • <administrator account> – Name of the administrator account on Administration Server.
    • <password> – Password of the administrator on Administration Server.
    • <Administration Server IP address> – IP address of the server hosting Kaspersky Security Center.
  4. Run the installation script. To do this, enter the following command in the SSH client:

    cd /Volumes/KLSHARE/<klnagent_package_folder>

    where <klnagent_package_folder> is the folder in which the Network Agent installation package is located.

    sudo ./install.sh -r <server> [-s <action>] [-p <port number>] [-l <SSL port number>]

    Parameter descriptions:

    • <action> – Parameter that defines whether or not encryption will be used when establishing the connection between Network Agent and Administration Server. If the value is "0", an unencrypted connection is used. If the value is "1", the connection is established via the SSL protocol (default value).
    • <server> – IP address or DNS name of the server on which Kaspersky Security Center is installed.
    • <port number> – Number of the port that will be used to establish an unencrypted connection to Administration Server. Port 14000 is used by default.
    • <SSL port number> – Number of the port that will be used to establish an encrypted connection to Administration Server using the SSL protocol. Port 13000 is used by default.

    Important: Administrator rights are required for executing this command.

  5. Disconnect the network drive on the remote computer. To do this, enter the following command in the SSH client:

    umount /Volumes/KLSHARE

  6. Check if Network Agent functions properly on the remote computer. To do this, enter the following commands in the SSH client:

    cd /Library/Application\ Support/Kaspersky\ Lab/klnagent/Binaries/

    sudo ./klnagchk

    If the check is successful, Network Agent functions properly.

Page top

[Topic kes127683]

Manage Network Agent from the command line

This section contains information on how to manage Network Agent using the command line on a client computer.

You can stop Network Agent and start it again using the command line on a client computer.

You can also connect a remote computer to Administration Server manually using the klmover utility and check the connection between the remote computer and Administration Server using the klnagchk utility.

In this section

Start/stop Network Agent on a remote computer

Check the connection between a client computer and Administration Server manually. Klnagchk utility

Connect a remote computer to Administration Server manually. Klmover utility

Page top

[Topic kes127684]

Start/stop Network Agent on a remote computer

You can stop Network Agent and it start again on a client computer by using the command line.

Stop Network Agent

On the remote computer, launch the launchctl utility with the unload command from the command line.

Command syntax

sudo launchctl unload /Library/LaunchDaemons/com.kaspersky.klnagent.plist

Start Network Agent

On the remote computer, launch the launchctl utility with the load command from the command line.

Command syntax

sudo launchctl load /Library/LaunchDaemons/com.kaspersky.klnagent.plist

Important: Administrator rights are required to stop and start Network Agent. 

Page top

[Topic kes127690]

Check the connection between a client computer and Administration Server manually. Klnagchk utility

Check the connection between a remote computer and Administration Server

On the remote computer, run the klnagchk utility from the command line.

The klnagchk utility is included in the Network Agent distribution kit.

After Network Agent has been installed, the klnagchk utility is located in the /Library/Application Support/Kaspersky Lab/klnagent/Binaries folder. Depending on the parameters that you specify, the klnagchk utility performs the following operations when run from the command line:

  • Displays the settings specified for the connection between Network Agent installed on the remote computer and Administration Server, or saves them in a file.
  • Saves Network Agent statistics (since the last startup of Network Agent) and utility execution results in a file, or displays this information on the screen.
  • Tries to establish a connection between Network Agent and Administration Server.
  • If the utility can't establish a connection, it sends an ICMP packet to check the status of the computer on which Administration Server is installed.

Before running the utility, go to /Library/Application Support/Kaspersky Lab/klnagent/Binaries in the command line.

Command syntax:

sudo ./klnagchk [-logfile <file name>] [-sp] [-savecert <path to certificate file>] [-restart]

Important: Administrator rights are required to run the utility.

Parameter descriptions

-logfile <file name> – Save the settings of the connection between Network Agent and Administration Server and utility execution results in a file. If this parameter is not specified, the server connection settings, execution results, and error messages are displayed on the screen.

-sp – Display the password for proxy server authentication on the screen or save it in a file. This parameter is used if Network Agent connects to Administration Server via a proxy server. By default, this parameter is not used.

-savecert <file name> – Save the certificate for authentication on Administration Server in a specified file.

-restart – Restart Network Agent after the utility finishes running.

Example:

sudo ./klnagchk -logfile klnagchk.log -sp

 

Page top

[Topic kes127686]

Connect a remote computer to Administration Server manually. Klmover utility

Connect a remote computer to Administration Server

On the remote computer, run the klmover utility from the command line.

The klmover utility is included in the Network Agent installation package.

After Network Agent has been installed, the klmover utility is located in the /Library/Application Support/Kaspersky Lab/klnagent/Binaries folder. Depending on the parameters that you specify, the klmover utility performs the following operations when run from the command line:

  • Connects Network Agent to Administration Server with the specified parameters.
  • Saves utility execution results in a file or displays them on the screen.

Before running the utility, go to /Library/Application Support/Kaspersky Lab/klnagent/Binaries in the command line.

Command line syntax:

sudo ./klmover [-logfile <file name>] [-address <server address>] [-pn <port number>] [-ps <SSL port number>] [-nossl] [-cert <path to certificate file>] [-silent] [-dupfix]

Important: The administrator rights are required to run the utility.

Parameter descriptions

-logfile <file name> – Save execution results in a file. If this parameter is not specified, execution results and error messages are displayed on the screen.

-address <server address> – Address that Network Agent uses to connect to Administration Server. You can specify either the IP address or the DNS name of the server.

Note: You can also use the command with this parameter to change the address of the Administration Server to which remote computers are connected.

-pn <port number> – Number of the port that will be used to establish an unencrypted connection to Administration Server. Port 14000 is used by default.

-ps <SSL port number> – Number of the port that will be used to establish an encrypted connection to Administration Server via the SSL protocol. Port 13000 is used by default.

-nossl – Use an unencrypted connection to Administration Server. If this parameter is not specified, Network Agent will establish a secure connection to Administration Server via the encrypted SSL protocol.

-cert <path to certificate file> – Use the specified certificate file for authentication on a new Administration Server. If this parameter is not specified, Network Agent will receive a certificate at the first connection to Administration Server.

-silent – Run the utility in silent mode.

-dupfix – This parameter is used if Network Agent was installed in a way that differs from the methods described in the Administrator's Guide, for example, if it was recovered from a disk image with Network Agent installed. If automatic self-identification of Network Agent results in duplicate icons of the original computer and other computers in the Administration Console, try reconnecting the duplicate computers.

Note: When running the klmover utility, it is recommended to specify values for all parameters.

Example:

sudo ./klmover -logfile klmover.log -address 192.0.2.12 -ps 13001

The remote computer that is connected to Administration Server via Network Agent is called a client computer.

Page top

[Topic kes127691]

Install and uninstall Kaspersky Endpoint Security

This section describes remote installation and uninstallation of Kaspersky Endpoint Security on a client computer.

You can also install or uninstall Kaspersky Endpoint Security locally.

In this section

Install the application using the SSH protocol

Install the application using Kaspersky Security Center

Create an installation package

Uninstall the application using Kaspersky Security Center

Page top

[Topic kes127692]

Install the application using the SSH protocol

Before installing Kaspersky Endpoint Security on a remote computer, make sure that the following conditions are met:

  • Kaspersky Security Center Administration Server is deployed on the corporate network.
  • Administration Console is installed on the Kaspersky Security Center administrator's workstation.
  • An installation package for Kaspersky Endpoint Security has been created and is located in a shared folder of Administration Server.
  • A key file for Kaspersky Endpoint Security is located in the shared folder of Administration Server (optional).
  • Remote Login is enabled on the remote computer.
  • The computer account used to install the application is included in sudoers.

Install Kaspersky Endpoint Security on a client computer using the SSH protocol

  1. Start the SSH client on the Kaspersky Security Center administrator's workstation.
  2. Connect to the remote computer.
  3. Connect the shared folder of Administration Server as a network drive on the remote computer. To do this, enter the following commands in the SSH client:

    mkdir /Volumes/KLSHARE

    mount_smbfs //<administrator account>:<password>@<Administration Server IP address>/KLSHARE /Volumes/KLSHARE

    Parameter descriptions:

    • <administrator account> – Name of the administrator account on Administration Server.
    • <password> – Password of the administrator on Administration Server.
    • <Administration Server IP address> – IP address of the server hosting Kaspersky Security Center.
  4. Run the installation script. To do this, enter the following commands in the SSH client:

    cd /Volumes/KLSHARE/<KES package folder>

    sudo ./install.sh

    where <KES package folder> is the folder in which the Kaspersky Endpoint Security installation package is located.

    Important: Administrator rights are required for executing this command.

  5. Disconnect the network drive on the remote computer. To do this, enter the following command in the SSH client:

    umount /Volumes/KLSHARE

Page top

[Topic kes127693]

Install the application using Kaspersky Security Center

Before installing Kaspersky Endpoint Security on a client computer, make sure that the following conditions are met:

  • Kaspersky Security Center Administration Server is deployed on the corporate network.
  • Administration Console is installed on the Kaspersky Security Center administrator's workstation.
  • Network Agent is installed on the client computer.
  • An installation package for Kaspersky Endpoint Security has been created and is stored in the shared folder of Administration Server.
  • A key file for Kaspersky Endpoint Security is stored in the shared folder of Administration Server (optional).
  • The client computer is added to the Managed computers administration group on Administration Server (optional).

For detailed information about administration groups on Administration Server, see Kaspersky Security Center Help.

To install Kaspersky Endpoint Security on a client computer via Kaspersky Security Center, you must create and start an Install application remotely task.

Create a task for remote installation of Kaspersky Endpoint Security on a client computer

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. Select the Tasks folder.
  4. In the workspace, start the New Task Wizard by clicking the Create a task button.
  5. Follow the steps of the New Task Wizard below to create a task for remote installation of Kaspersky Endpoint Security on the client computer.

To proceed to the next step of the wizard, click the Next button. To return to the previous step of the wizard, click the  button. To exit the wizard at any step, click the Cancel button.

The appearance of buttons may vary depending on your version of Windows.

Step 1. Select the task type

  1. In the Select the task type window, maximize the Kaspersky Security Center 10 Administration Server node.
  2. Select the Install application remotely task.

Step 2. Select the installation package

  1. In the Select installation package window, do one of the following:
    • If the Kaspersky Endpoint Security installation package with the required settings has been created previously, select it in the list of installation packages in the upper part of the Select installation package window.
    • If the required installation package has not been created yet, click New to start the New Package Wizard.

Step 3. Install additional applications

In the Advanced window, select the Install Network Agent checkbox and the Nagent for Mac checkbox if you want to install Network Agent on the client computer.

Note: The installation package for Network Agent must be created beforehand.

Step 4. Configure the installation settings

In the Settings window, configure remote installation of the application.

Step 5. Select an administration group to add computers to after installation

In the Moving to the list of managed computers window, select a group to which computers will be moved after installation if necessary.

Note: The Moving to the list of managed computers window appears if you select to install Network Agent in step 3.

Step 6. Define how to select client computers for which the task will be created

In the Select devices to which the task will be assigned window, select the method you want to use to specify client computers:

  • To select from among computers detected on the network by Administration Server, select the Select networked devices detected by Administration Server option.
  • To specify the IP addresses of computers manually or import the IP addresses of computers from a file, select the Specify device addresses manually, or import addresses from list option.
  • To create a task for a selection of devices based on a preset criterion, select the Assign task to a device selection option.
  • To select computers from a specific administration group, select the Assign task to an administration group option.

Step 7. Select client computers

In the window that opens (Select devices, Device selection, or Select Administration group, depending on the option you selected in the previous step), select the client computers, specify the IP addresses of computers, specify a computer selection, or select the administration group to which the task will be applied.

Step 8. Select an account to run the task

In the Selecting an account to run the task window, select the No account required (Network Agent installed) checkbox.

It is assumed that you have installed Network Agent before starting this wizard.

Step 9. Configure the task schedule

  1. In the Configure task scheduling settings window, select the start mode in the Scheduled start drop-down list.
  2. If necessary, configure a scheduled task to start automatically (by specifying the task start date and time).
  3. If you want to run tasks that the application was unable to start according to schedule (for example, because the computer was turned off at the scheduled time), select the Run missed tasks checkbox.

    Kaspersky Endpoint Security starts the task as soon as the obstacle preventing the task from being started is eliminated.

Step 10. Specify the task name

In the Define the task name window, in the Name field, enter the name of the task you are creating.

Step 11. Finish creating the task

In the Finishing creating the task window, do the following:

  1. If you want the task to start as soon as the wizard is finished, select the Run task after Wizard finishes checkbox.
  2. Click the Finish button to close the wizard.

The task that you have created appears in the workspace of the Tasks folder.

Page top

[Topic kes135503]

Create an installation package

When you create the Install application remotely task, you can either use an existing installation package or create a new one. Installation packages are located in the Advanced > Remote installation > Installation packages node.

Create an installation package in Kaspersky Security Center

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. In the console tree, select the Advanced folder, then Remote installation subfolder, and then the Installation packages subfolder.
  4. In the workspace, click the Create installation package button.
  5. In the Select installation package type window, click Create an installation package for Kaspersky Lab application.
  6. In the Defining installation package name window, type the name of the new installation package in the Name field and click Next.
  7. In the Selecting the distribution package for installation window, click the Browse button.

    The window for selecting a file for creating the installation package opens.

  8. Open the folder with the contents of the Kaspersky Endpoint Security installation package and select the kesmac.kud file.

    The Selecting the distribution package for installation window shows the name and version of the application to be installed remotely using the file that has been added.

  9. Select the Copy updates from repository to installation package checkbox to copy application updates from the Kaspersky Security Center storage into the installation package if necessary and click Next.

    The License Agreement window opens.

  10. In the License Agreement window, select the I accept the terms of the License Agreement checkbox and click Next.

    The installation package starts uploading to Administration Server. When the upload is finished, the Installation Type window opens.

  11. In the Installation Type window, do the following:
    1. In the Packages to install section, deselect the checkboxes next to the names of the components that you want to skip during installation on the client computer.

      If you skip installation of the Graphical User Interface (GUI) component, the user of the client computer will not be able to activate Kaspersky Endpoint Security and manage the application via the local graphical user interface or configure the application settings and Kaspersky Security Network usage settings via the local GUI.

    2. If you want to participate in Kaspersky Security Network, in the Kaspersky Security Network settings section, select the I agree to participate in Kaspersky Security Network checkbox.
    3. If you want to read the text of the Kaspersky Security Network Statement, click the KSN Statement button.

      As you continue to use Kaspersky Endpoint Security, you can opt in or out of participation in Kaspersky Security Network at any time.

  12. In the Installation Type window, click Next.

    The Kaspersky Endpoint Security installation package is created with the specified settings.

  13. In the last window of the wizard, click the Finish button to exit the New Package Wizard.
Page top

[Topic kes127736]

Uninstall the application using Kaspersky Security Center

Before removing Kaspersky Endpoint Security from a client computer via Kaspersky Security Center, make sure the following conditions are met:

  • Kaspersky Security Center Administration Server is deployed on the corporate network.
  • Administration Console is installed on the Kaspersky Security Center administrator's workstation.
  • Network Agent is installed on the client computer.

To uninstall Kaspersky Endpoint Security from the client computer via Kaspersky Security Center, you have to create and start the Uninstall application remotely task.

Important: Removing Kaspersky Endpoint Security from a client computer may lead to a risk of infection.

Create a task for remote uninstallation of Kaspersky Endpoint Security from a client computer

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. Select the Tasks folder.
  4. In the workspace, start the New Task Wizard by clicking the Create a task button.
  5. Follow the steps of the New Task Wizard below to create the task for remote uninstallation of Kaspersky Endpoint Security from the client computer.

To proceed to the next step of the wizard, click the Next button. To return to the previous step of the wizard, click the  button. To exit the wizard at any step, click the Cancel button.

The appearance of buttons may vary depending on your version of Windows.

Step 1. Select the task type

  1. In the Select task type window, expand the Kaspersky Security Center 10 Administration Server node.
  2. Expand the Advanced child node.
  3. Select the Uninstall application remotely task.

Step 2. Select the application to uninstall

In the Select application to be removed window, select Uninstall application supported by Kaspersky Security Center 10.

Step 3. Configure uninstallation settings

In the Settings window, in the Application to be removed drop-down list, select Kaspersky Endpoint Security 10 Service Pack 2 for Mac.

Step 4. Select the operating system restart option

In the Selecting operating system restart option window, select the Do not restart the computer option.

Step 5. Define how to select client computers for which the task will be created

In the Select devices to which the task will be assigned window, select the method you want to use to specify client computers:

  • To select from among computers detected on the network by Administration Server, select the Select networked devices detected by Administration Server option.
  • To specify the IP addresses of computers manually or import the IP addresses of computers from a file, select the Specify device addresses manually, or import addresses from list option.
  • To create a task for a selection of devices based on a preset criterion, select the Assign task to a device selection option.
  • To select computers from a specific administration group, select the Assign task to an administration group option.

Step 6. Select client computers

In the window that opens (Select devices, Device selection, or Select Administration group, depending on the option you selected in the previous step), select the client computers, specify the IP addresses of computers, specify a computer selection, or select the administration group to which the task will be applied.

Step 7. Select a user account to run the task

In the Selecting an account to run the task window, select the No account required (Network Agent installed) checkbox.

It is assumed that you have installed Network Agent before starting this wizard.

Step 8. Configure the task schedule

  1. In the Configure task scheduling settings window, select the start mode in the Scheduled start drop-down list.
  2. If necessary, configure a scheduled task to start automatically (by specifying the task start date and time).
  3. If you want to run tasks that the application was unable to start according to schedule (for example, because the computer was turned off at the scheduled time), select the Run missed tasks checkbox.

    Kaspersky Endpoint Security starts the task as soon as the obstacle preventing the task from being started is eliminated.

Step 9. Specify the task name

In the Define the task name window, in the Name field, enter the name of the task you are creating.

Step 10. Finish creating the task

  1. To start the task as soon as the wizard is finished, in the Finish creating the task window, select the Run task after Wizard finishes checkbox.
  2. Click the Finish button to exit the wizard.

The task that you have created appears in the workspace of the Tasks folder.

Page top

[Topic kes127747]

Start and stop the application via Kaspersky Security Center

You can start or stop Kaspersky Endpoint Security on a selected computer in the list of devices managed via Kaspersky Security Center.

Start or stop Kaspersky Endpoint Security via Kaspersky Security Center

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. Select the Devices tab.
  6. Select a computer from the list of client computers.
  7. Open the Properties: <Computer name> window in one of the following ways:
    • Double-click the name of the client computer.
    • Right-click the client computer and choose Properties from the context menu.
  8. Select the Applications section.
  9. In the Kaspersky Lab applications installed on client computer list, right-click to open the context menu of the Kaspersky Endpoint Security 10 Service Pack 2 for Mac item and do one of the following:
    • To start the application, select the Start item.
    • To stop the application, select the Stop item.

Important: After Kaspersky Endpoint Security is stopped, the client computer keeps running in unprotected mode, which may lead to a risk of infection.

Page top

[Topic kes127786]

Create and manage tasks

This section describes how to use Kaspersky Security Center to create and configure tasks that Kaspersky Endpoint Security performs on a client computer or a group of computers.

A task is a set of configurable actions which Kaspersky Endpoint Security performs on a client computer.

In Kaspersky Security Center, you can create the following tasks:

  • Virus Scan
  • Update
  • Rollback
  • Add key

You can take the following actions on tasks:

  • Start and stop tasks.
  • Configure task settings.
  • Track the progress of a task.
  • Copy and move tasks from one group to another.
  • Delete tasks.
  • Import and export tasks.

For detailed information about tasks, see Kaspersky Security Center Help.

Page top

[Topic kes132173]

Create tasks

When managing Kaspersky Endpoint Security via Kaspersky Security Center, you can create the following types of tasks:

  • Local tasks. A local task is a task that is created to be run on a single client computer.
  • Group tasks. A group task is a task that is run on computers in an administration group.
  • Tasks for an arbitrary set of computers. You can create a task to be run on any computers regardless of whether they belong to an administration group or a computer selection.

Create a local task for a separate client computer

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Devices tab.
  6. Select the computer from the list of client computers.
  7. Open the Properties: <Computer name> window in one of the following ways:
    • Double-click the name of the client computer.
    • Right-click the client computer and choose Properties from the context menu.
  8. In the Properties: <Computer name> window, select the Tasks section.

    The list of system tasks and custom tasks for the selected client computer is displayed in the workspace on the right.

  9. Click the Add button in the lower part of the workspace.

    The New Task Wizard starts.

  10. Follow the steps of the New Task Wizard to create a local task for a separate client computer.

Create a task for client computers in an administration group

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Tasks tab.
  6. In the workspace, start the New Task Wizard by clicking the Create a task button.
  7. Follow the steps of the New Task Wizard to create a task for client computers included in the administration group.

For detailed information on how to create group tasks, see Kaspersky Security Center Help.

Create a task for an arbitrary set of computers

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. In the console tree, select the Tasks node.
  4. In the workspace, start the New Task Wizard by clicking the Create a task button.
  5. Follow the steps of the New Task Wizard to create a task for an arbitrary set of computers.

To proceed to the next step of the wizard, click the Next button. To return to the previous step of the wizard, click the  button. To exit the wizard at any step, click the Cancel button.

The appearance of buttons may vary depending on your version of Windows.

Step 1. Specify the task name

Note: Depending on the task type, this step might appear either at the beginning or at the end of the wizard.

In the Define the task name window, in the Name field, specify the name of the task that you are creating.

Step 2. Select an application and define the task type

  1. In the Select the task type window, maximize the Kaspersky Endpoint Security 10 Service Pack 2 for Mac node.
  2. Select the type of the task you want to create:
    • To create a task for adding a key, select Add key.
    • To create a task to roll back the latest update, select Rollback.
    • To create an update task, select Update.
    • To create a virus scan task, select Virus Scan.

Step 3. Configure settings for the selected task type

Depending on the task type selected during the previous step, the contents of the settings window may vary. This window is not displayed for the Rollback task.

Application activation

In the Application activation window, do the following:

  1. Select an activation code or key file from Kaspersky Security Center storage or add a key file stored on your computer.
  2. If you want to add the specified key as a reserve key, select the Add as reserve key checkbox.

    The reserve key becomes active when the current active key expires.

Information about the specified key (key, key type, and key expiration date) is displayed in the Application activation window.

Update

By default, Kaspersky Endpoint Security updates databases and application modules and uses Kaspersky Security Center Administration Server and Kaspersky Lab update servers as updates sources.

If necessary, edit the Update task settings in the Update window:

  1. To disable updates of application modules, deselect the Update application modules checkbox.
  2. If you want Kaspersky Endpoint Security to copy the downloaded update files to the specified folder, select the Copy update files to folder checkbox and enter the path to the folder.
  3. To change the update sources:
    1. Click the Settings button.

      The Settings: Update window opens.

    2. Select the checkboxes next to the update sources that you want to use.
    3. To specify a different update source, click the Add button.

      The Update source window opens.

    4. Specify the web address of the update source or the path to a local or network folder that is an update source and click OK.
    5. Click OK to save changes and close the Settings: Update window.

Virus Scan

By default, Kaspersky Endpoint Security uses the Recommended security level, prompts the user for an action when it detects an infected object after the scan, and scans the following objects:

  • All removable drives
  • All internal drives
  • All network drives
  • Memory

If necessary, edit the Virus Scan settings in the Virus Scan window:

  1. Select one of the preset security levels or customize security settings.
  2. Specify the action that Kaspersky Endpoint Security performs on detecting an infected object.
  3. Define a scan scope.

Step 4. Define how to select client computers for which the task will be created

Note: This step is not relevant for local or group tasks.

In the Select devices to which the task will be assigned window, select the method you want to use to specify client computers:

  • To select from among computers detected on the network by Administration Server, select the Select networked devices detected by Administration Server option.
  • To specify the IP addresses of computers manually or import the IP addresses of computers from a file, select the Specify device addresses manually, or import addresses from list option.
  • To create a task for a selection of devices based on a preset criterion, select the Assign task to a device selection option.
  • To select computers from a specific administration group, select the Assign task to an administration group option.

Step 5. Select client computers

Note: This step is not relevant for local or group tasks.

In the window that opens (Select devices, Device selection, or Select Administration group, depending on the option you selected in the previous step), select the client computers, specify the IP addresses of computers, specify a computer selection, or select the administration group to which the task will be applied.

Step 6. Configure the task schedule

  1. In the Configure task scheduling settings window, select the start mode in the Scheduled start drop-down list.
  2. If necessary, configure a scheduled task to start automatically (by specifying the task start date and time).
  3. If you want to run tasks that the application was unable to start according to schedule (for example, because the computer was turned off at the scheduled time), select the Run missed tasks checkbox.

    Kaspersky Endpoint Security starts the task as soon as the obstacle preventing the task from being started is eliminated.

  4. If you want Kaspersky Security Center to automatically determine the interval between task launches on different computers, select the Define task launch delay automatically checkbox.

    This helps to reduce the load on Kaspersky Security Center Administration Server.

  5. To set the interval between task launches on different computers manually, select the Randomize the task start with interval (min) checkbox and specify the number of minutes.

    This helps to reduce the load on Kaspersky Security Center Administration Server.

Step 7. Finish creating the task

In the Finishing creating the task window, do the following:

  1. If you want the task to start as soon as the wizard is finished, select the Run task after Wizard finishes checkbox.
  2. Click the Finish button to close the wizard.
Page top

[Topic kes132179]

Start and stop tasks manually

Scheduled tasks are started and stopped automatically according to a schedule. However, you can start a task manually at any time.

Note: Tasks are started on a client computer only if Network Agent is running. If Network Agent stops running, all active tasks are interrupted.

Start and stop tasks manually

  1. Open the list of tasks that contains the task that you want to start or stop.
  2. Select the task that you want to start or stop.
  3. Start or stop the task in one of the following ways:
    • Right-click to display the context menu of the task and choose Start or Stop.
    • In the workspace, click the Start or Stop button.
    • Right-click to display the context menu of the task and choose Properties. In the window that opens, click the Start or Stop button.
Page top

[Topic kes135665]

Import and export tasks

You can export group tasks and tasks for an arbitrary set of computers into a file.

Export a task

  1. Select the task list from which you want to export the task:
    • Select the administration group and then open the Tasks tab.
    • In the console tree, select the Tasks folder.
  2. Right-click the task you want to export and in the shortcut menu of the task choose All Tasks > Export.
  3. In the Save As window, specify the file name and location where the exported task will be saved.
  4. Click the Save button.

Import a task

  1. Select the task list to which you want to import the task:
    • Select the administration group and then open the Tasks tab.
    • In the console tree, select the Tasks folder.
  2. Import the task in any of the following ways:
    • In the shortcut menu of the task list, select All Tasks > Import.
    • Click the Import task from file button.
  3. In the Open window, specify the path to the task file you want to import.
  4. Click the Open button.

The task is displayed in the task list.

Page top

[Topic kes132175]

View tasks

You can view the list of tasks created for a specific computer, for computers in a specific administration group, or the list of all non-local tasks.

View tasks for a specific administration group

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Tasks tab.

The list of tasks for computers in the selected administration group is displayed.

View local tasks

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Devices tab.
  6. Select the computer from the list of client computers.
  7. Open the Properties: <Computer name> window in one of the following ways:
    • Double-click the name of the client computer.
    • Right-click the client computer and choose Properties from the context menu.
  8. In the Properties: <Computer name> window, select the Tasks section.

The list of system tasks and custom tasks for the selected client computer is displayed in the workspace on the right.

View non-local tasks

  1. Start Administration Console of Kaspersky Security Center.
  2. Maximize the Administration Server <Server name> node.
  3. In the console tree, select the Tasks node.

The list of non-local tasks created for computers that may or may not be part of administration groups is displayed.

Page top

[Topic kes132177]

Manage task-specific settings

View settings of a local task

  1. Open the list of local tasks.
  2. Select a task in the list and open the task settings in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.

View settings of a group task

  1. Open the list of group tasks for an administration group.
  2. Select a task in the list and open the task settings in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Change task settings link in the workspace.

View settings of a non-local task

  1. Open the list of non-local tasks.
  2. Select a task in the list and open the task settings in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Change task settings link in the workspace.

For more information about tasks, see Kaspersky Security Center Help.

For local tasks, group tasks, or tasks for an arbitrary set of computers

Manage Add key task settings

  1. Open the window with the settings of the Add key task.
  2. Select the Application activation section.
  3. If necessary, add another key in one of the following ways:
    • To select a key or an activation code from among the activation codes added to the Kaspersky Security Center storage:
      1. Select the Key or activation code option.
      2. Click the Browse button.

        The Keys and activation codes in Kaspersky Security Center storage window opens.

      3. Select a key or activation code.
      4. Click the OK button.
    • To add a key file:
      1. Select the Key file option.
      2. Click the Add button.

        The file selection window opens.

      3. Select a key file.
      4. Click the Open button.

    Note: The current key is deleted when a different key is added.

  4. To add the specified key as a reserve key, select the Add as reserve key checkbox.

    The reserve key becomes active when the current key expires.

    Note: The reserve key expiration date must be later than the current key expiration date.

  5. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: <Task name> window after saving changes.
    • Click the OK button to close the Properties: <Task name> window after saving changes.

Manage Virus Scan task settings

  1. Open the window with the Virus Scan task settings.
  2. Select the Virus Scan section.
  3. To change the level of security on which Kaspersky Endpoint Security runs the Virus Scan task, do one of the following in the Security level section:
    • Select a preset security level by moving the slider up or down the scale.

      You can select one of the following security levels:

      • Maximum Protection. Kaspersky Endpoint Security performs the maximum monitoring of files that are opened, saved, or executed.
      • Recommended. Kaspersky Endpoint Security monitors files with the settings recommended by Kaspersky Lab.

        This is the default security level.

      • Maximum speed. Kaspersky Endpoint Security monitors a minimum set of files. You can choose this security level if you want to comfortably use other applications that require significant RAM resources.
    • Configure security settings manually:
      1. Click the Settings button.

        The Settings: Virus Scan window opens.

      2. On the General tab, in the File types section, select the types of files that should be scanned by Kaspersky Endpoint Security when running the Virus Scan task.
      3. On the General tab, in the Optimization section, configure the scan performance.
      4. On the General tab in the Compound files section, select which compound files you want Kaspersky Endpoint Security to analyze for detectable objects.
      5. On the Advanced tab, in the Advanced settings section, configure the use of iSwift technology and recording of information about detected objects in the application statistics.
      6. On the Advanced tab, in the Heuristic Analyzer section, configure the use of Heuristic Analyzer and select the protection level to be applied by Heuristic Analyzer during virus scans.
      7. Click OK to save changes and close the Settings: Virus Scan window.

        The security level changes to Custom.

    • To restore the default settings, click the Default button.

      The security level changes to Recommended.

  4. If necessary, in the Action section, select the action that Kaspersky Endpoint Security should perform when an infected object is detected.
  5. To specify a scan scope, in the Scan scope section, click the Settings button and do the following in the window that opens:
    1. Click the Settings button.

    The Scan scope window opens.

    1. If you want Kaspersky Endpoint Security to scan all removable drives, select the All removable drives checkbox.
    2. If you want Kaspersky Endpoint Security to scan all internal drives, select the All internal drives checkbox.
    3. If you want Kaspersky Endpoint Security to scan all network drives, select the All network drives checkbox.
    4. If you want Kaspersky Endpoint Security to scan the computer memory, select the Memory checkbox.
    5. If you want Kaspersky Endpoint Security to scan other files or folders, click the Add button and specify a file, folder, or name mask of a file or folder.
  6. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: <Task name> window after saving changes.
    • Click the OK button to close the Properties: <Task name> window after saving changes.

Manage Update task settings

  1. Open the window with the Update task settings.
  2. Select the Update section.
  3. If you want Kaspersky Endpoint Security to update application modules along with application databases, select the Update application modules checkbox.
  4. If you want Kaspersky Endpoint Security to copy the update files to a local or network folder, select the Copy update files to folder checkbox and enter the path to the relevant folder.
  5. To choose an update source:
    1. Click the Settings button.

      The Settings: Update window opens.

    2. Specify the update source in one of the following ways:
      • If you want the application to download updates from Administration Server, select the Kaspersky Security Center checkbox.
      • If you want the application to download updates from Kaspersky Lab update servers, select the Kaspersky Lab update servers checkbox.
      • To add a different update source, click the Add button and in the window that opens type the path to the update source.

        By default, Kaspersky Endpoint Security downloads updates from Administration Server and Kaspersky Lab update servers.

  6. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: <Task name> window after saving changes.
    • Click the OK button to close the Properties: <Task name> window after saving changes.

For local tasks only

Manage File Anti-Virus task settings

  1. Open the list of local tasks for a client computer.
  2. In the list of local tasks, select the File Anti-Virus task and open its properties in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Properties button.
  3. Select the File Anti-Virus section.
  4. If necessary, configure the following settings in the File Anti-Virus section:
    • Enable or disable File Anti-Virus on the client computer.
    • To select one of the preset security levels, use the slider in the Security level section.
    • To configure the security settings manually, click the Settings button and do the following:
      1. On the General tab, in the File types section, select the types of files that Kaspersky Endpoint Security should scan when they are opened, executed, or saved.
      2. On the General tab, in the Optimization section, configure the scan performance and select the scan technology.
      3. On the General tab, in the Compound files section, select which compound files should be scanned for detectable objects and set a restriction on scanning large-sized objects.
      4. On the Protection scope tab, specify files or folders that should be scanned by File Anti-Virus.

        By default, scanning of all objects located on removable, internal, and network drives connected to the client computer is enabled. You can add an object to the protection scope, modify an object on the list, temporarily disable scanning of an object on the list, or remove an object from the list.

      5. Select File Anti-Virus operation mode in the Scan mode section of the Advanced tab.
      6. On the Advanced tab, in the Pause task section, enable or disable scheduled pausing of File Anti-Virus and configure automatic pausing of tasks according to a schedule.
      7. On the Advanced tab, in the Heuristic Analyzer section, configure the use of Heuristic Analyzer by File Anti-Virus.
    • In the If a malicious object is detected section, select the action that File Anti-Virus performs upon detecting an infected object.
  5. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: File Anti-Virus window after saving changes.
    • Click the OK button to close the Properties: File Anti-Virus window after saving changes.

Manage Web Anti-Virus task settings

  1. Open the list of local tasks for a client computer.
  2. In the list of local tasks, select the Web Anti-Virus task and open its properties in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Properties button.
  3. Select the Web Anti-Virus section.
  4. If necessary, configure the following settings in the Web Anti-Virus section:
    • Enable or disable Web Anti-Virus on the client computer.
    • To select one of the preset security levels, use the slider in the Security level section.
    • To configure the security settings manually, click the Settings button and do the following:
      1. In the Scan mode section, enable or disable checking of web addresses against the database of malicious web addresses.
      2. In the Anti-Phishing settings section, enable or disable checking of web addresses against the database of phishing web addresses.
      3. In the Anti-Phishing settings section, enable or disable the use of Heuristic Analyzer for detecting phishing links.
  5. In the If a malicious object is detected section, select the action that Web Anti-Virus performs upon detecting a dangerous object in web traffic.
  6. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: Web Anti-Virus window after saving changes.
    • Click the OK button to close the Properties: Web Anti-Virus window after saving changes.

Manage Quick Scan task settings

  1. Open the list of local tasks for a client computer.
  2. In the list of local tasks, select the Quick Scan task and open its properties in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Properties button.
  3. Select the Virus Scan section.
  4. If necessary, configure the following settings in the Virus Scan section:
    • To select one of the preset security levels, use the slider in the Security level section.
    • To configure the security settings manually, click the Settings button and do the following:
      1. On the General tab, in the File types section, select the types of files that should be scanned by Kaspersky Endpoint Security.
      2. On the General tab, in the Optimization section, configure the scan performance.
      3. On the General tab, in the Compound files section, select which compound files you want Kaspersky Endpoint Security to scan.
      4. On the Advanced tab, in the Advanced settings section, configure the use of iSwift technology and the saving of information about detected objects in the application statistics.
      5. On the Advanced tab, in the Heuristic Analyzer section, configure the use of Heuristic Analyzer and select the protection level to be applied by Heuristic Analyzer.
    • In the Action section, select the action that Kaspersky Endpoint Security should perform upon detecting an infected object.
    • To specify a scan scope, in the Scan scope section, click the Settings button and do the following in the window that opens:
      • If you want Kaspersky Endpoint Security to scan objects in the default list, select the checkbox next to the relevant object.
      • If you want Kaspersky Endpoint Security to scan other files or folders, click the Add button and specify a file, folder, or name mask of a file or folder.
  5. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: Quick Scan window after saving changes
    • Click the OK button to close the Properties: Quick Scan window after saving changes.

Manage Full Scan task settings

  1. Open the list of local tasks for a client computer.
  2. Open the properties of the Full Scan task in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
  3. Select the Virus Scan section.
  4. If necessary, configure the following settings in the Virus Scan section:
    • To select one of the preset security levels, use the slider in the Security level section.
    • To configure the security settings manually, click the Settings button and do the following
      1. On the General tab, in the File types section, select the types of files that should be scanned by Kaspersky Endpoint Security.
      2. On the General tab, in the Optimization section, configure the scan performance.
      3. On the General tab, in the Compound files section, select which compound files you want Kaspersky Endpoint Security to scan.
      4. On the Advanced tab, in the Advanced settings section, configure the use of iSwift technology and the saving of information about detected objects in the application statistics.
      5. On the Advanced tab, in the Heuristic Analyzer section, configure the use of Heuristic Analyzer and select the protection level to be applied by Heuristic Analyzer.
    • In the Action section, select the action that Kaspersky Endpoint Security should perform upon detecting an infected object.
    • To specify a scan scope, in the Scan scope section, click the Settings button and do the following in the window that opens:
      • If you want Kaspersky Endpoint Security to scan objects in the default list, select the checkbox next to the relevant object
      • If you want Kaspersky Endpoint Security to scan other files or folders, click the Add button and specify a file, folder, or name mask of a file or folder.
  5. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: Full Scan window after saving changes.
    • Click the OK button to close the Properties: Full Scan window after saving changes.

Manage Network Attack Blocker task settings

  1. Open the list of local tasks for a client computer.
  2. In the list of local tasks, select the Network Attack Blocker task and open its properties in one of the following ways:
    • Double-click the task name.
    • Right-click to display the shortcut menu of the task and select Properties.
    • Click the Properties button.
  3. Select the Network Attack Blocker section.
  4. If necessary, configure the following settings in the Network Attack Blocker section:
    • Enable or disable Network Attack Blocker on the client computer.
    • In the Network Attack Blocker settings section, select or clear the Block attacking computers for <value> min checkbox and specify the value.
    • You can also specify the IP addresses of computers whose network activity will not be blocked. To do this, perform the following steps:
      • Click the Exclusions button.

        The Exclusions window opens.

      • Click the Add button.

        The IP address window opens.

      • Specify the IP address of the computer whose network activity will not be blocked.
  5. Save the changes in one of the following ways:
    • Click the Apply button to remain in the Properties: Network Attack Blocker window after saving changes.
    • Click the OK button to close the Properties: Network Attack Blocker window after saving changes.
Page top

[Topic kes127751]

Create and manage policies

This section contains information on how to create and configure policies for Kaspersky Endpoint Security.

A policy determines the settings of an application and manages the access to configuration of an application installed on computers within an administration group. An individual policy must be created for each application. You can create an unlimited number of various policies for applications installed on computers in each administration group, but only one policy can be applied to each application at a time within an administration group.

When creating and configuring a policy, you can allow or prohibit changes to any group of settings in policies using the and buttons.

You can perform the following actions on custom policies:

  • Create policies.
  • Configure policies.
  • Copy or move policies from one group to another.
  • Delete policies
  • Change the status of policies.
  • Export policies to a file.
  • Import policies from a file.

For detailed information about the Kaspersky Security Center policies, see Kaspersky Security Center Help.

Page top

[Topic kes127752]

Create a policy

This section contains instructions on how to start the New Policy Wizard to create a policy.

Create a policy from the folder of an administration group

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Policies tab and click the Create a policy button.

    The New Policy Wizard opens.

  6. Follow the steps of the New Policy Wizard to create a policy.

Create a policy from the Policies folder

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Policies folder and click the Create a policy button.

    The New Policy Wizard opens.

  4. Follow the steps of the New Policy Wizard to create a policy.

To proceed to the next step of the wizard, click the Next button. To return to the previous step of the wizard, click the  button. To exit the wizard at any step, click the Cancel button.

The appearance of buttons may vary depending on your version of Windows.

Step 1. Select an application

In the Select the application for which you want to create a group policy window, in the list of applications, select Kaspersky Endpoint Security 10 Service Pack 2 for Mac.

Step 2. Specify the name of the policy

  1. In the Enter a group policy name window, in the Name field, specify the name of the policy that you are creating. The name can't contain the following symbols: “ * < : > ? \ |.
  2. Select the Use settings from policy for previous version of application checkbox if you want to import the settings from an existing Kaspersky Endpoint Security policy to a new policy.

Step 3. Specify protection settings

In the Protection window, configure the following settings if necessary:

  • Configure protection settings for the operating system on the client computer.
  • Configure Trusted Zone.
  • Select types of objects to be detected.
  • Disable or enable the start of scheduled tasks when the computer is running on battery power.

Step 4. Configure File Anti-Virus settings

In the File Anti-Virus window, do the following if necessary:

  • Enable or disable File Anti-Virus.

    By default, File Anti-Virus is enabled.

  • Select a security level.

    By default, the security level recommended by Kaspersky Lab is selected.

  • Select actions to be performed upon detecting a malicious object.

Step 5. Configure Web Anti-Virus settings

In the Web Anti-Virus window, do the following if necessary:

  • Enable or disable Web Anti-Virus.

    By default, Web Anti-Virus is enabled.

  • Select a security level.

    By default, the security level recommended by Kaspersky Lab is selected.

  • Select the action to be performed upon detecting a malicious object in web traffic.
  • Enable or disable scanning of inbound and outbound HTTPS traffic.

Step 6. Configure Network Attack Blocker

In the Network Attack Blocker window, do the following if necessary:

  • Enable or disable Network Attack Blocker.

    By default, Network Attack Blocker is enabled.

  • Configure Network Attack Blocker settings.

Step 7. Configure FileVault disk encryption

  1. In the FileVault Disk Encryption window, enable or disable FileVault encryption management for a user's startup disk.
  2. Choose the Encrypt disk option, if you want to encrypt user's startup disk when the policy is applied to a client computer.

By default, the FileVault encryption is disabled.

If the Enable FileVault disk encryption management checkbox is unselected, users with administrator rights can encrypt and decrypt their Mac startup disks from System Preferences.

If the Enable FileVault disk encryption management checkbox and the Encrypt disk option are selected, users with administrator can't decrypt the startup disk of their Mac from System Preferences.

If the Enable FileVault disk encryption management checkbox and the Decrypt disk option are selected, users with administrator rights can't encrypt the startup disk of their Mac from System Preferences.

Step 8. Configure update settings

In the Update window, do the following if necessary:

  • Enable or disable updating application modules.
  • Enable or disable copying of update files to a specific folder.
  • Specify the folder to which the application will copy update files.
  • Specify update sources.

Step 9. Configure KSN settings

In the KSN window, do the following if necessary:

  • Read the full text of the Kaspersky Security Network Statement by clicking the KSN Statement button.
  • Enable or disable the use of Kaspersky Security Network.
  • Enable or disable the use of KSN proxy.

When you choose to participate in Kaspersky Security Network in a policy settings, Kaspersky Endpoint Security statistics from client computers to which the policy is applied are automatically sent to Kaspersky Lab to enhance protection of these computers.

Note: Kaspersky Lab doesn't collect, process, or store any personal data.

Step 10. Configure user interaction settings

In the User Interaction window, configure the settings of Kaspersky Endpoint Security interaction with the user of the client computer if necessary.

Step 11. Configure network connection settings

In the Network window, configure the connection to a proxy server if necessary.

Step 12. Configure reports and Backup settings

In the Reports window, do the following if necessary:

  • Configure settings for generating and storing reports.
  • Configure settings for storing objects in Backup.

Step 13. Select the policy status and complete the creation of a policy

In the Create the group policy for the application window, do the following:

  1. Select the status that will be assigned to the policy:
    • Active policy: the policy is applied to the selected administration group.
    • Inactive policy: the policy is not applied.
    • Out-of-office policy: the policy is applied to the selected administration group when the computers are disconnected from the corporate network.

    Note: You can create multiple policies for an application in an administration group, but only one of them can be active.

    For detailed information about policy statuses, see Kaspersky Security Center Help.

  2. Select the Open policy properties immediately after they are created checkbox if you want to review the policy settings after the policy is created.
  3. Click Finish to close the New Policy Wizard.

    The policy that you have created appears on the Policies tab in the workspace of the relevant administration group. The policy is applied to client computers after their first synchronization with Administration Server.

You can edit the settings of the policy you have created. You can also prohibit or allow changes to each group of settings from a client computer using the and buttons for each group of settings. The button next to a group of settings signifies that the user of a client computer is not allowed to edit these settings on the user's computer. The button next to a group of settings signifies that the user of a client computer is allowed to edit these settings on the user's computer.

Page top

[Topic kes127782]

View the list of policies

You can create an unlimited number of various policies for applications installed on computers in each administration group, but only one policy can be applied to each application at a time within an administration group.

View the list of policies of an administration group

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Policies tab.

    The list of policies is displayed.

Page top

[Topic kes127777]

Configure policy settings

You can make changes to the policy that you created in Kaspersky Security Center and block any changes to its settings in the policies of subgroups and in task settings.

Kaspersky Endpoint Security policy settings include application settings and task settings.

Configure policy settings

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. Open the Managed devices folder.
  4. In the workspace, select the Policies tab.
  5. Right-click the policy you want to configure and choose Properties.
  6. In the Properties: <Policy name> window, configure policy settings as necessary:

    Configure the following protection settings in the Protection section

    • Enable or disable real-time protection of the client computer.
    • Enable or disable the start of Kaspersky Endpoint Security when the client computer starts.
    • Configure Trusted Zone.
    • Select types of objects to be detected.
    • Disable or enable the start of scheduled tasks when the computer is running on battery power.

    Configure the following settings in the File Anti-Virus section

    • Enable or disable Web Anti-Virus.
    • Select one of the preset security levels or configure security settings manually.
    • Enable or disable checking of web addresses against the database of malicious web addresses.
    • Configure Anti-Phishing settings.
    • Add trusted addresses whose traffic will not be scanned by Web Anti-Virus.
    • Select the action to be performed upon detecting a malicious object in web traffic.
    • Enable or disable scanning of inbound and outbound HTTPS traffic.

    Configure the following settings in the Network Attack Blocker section

    • Enable or disable Network Attack Blocker.
    • Configure Network Attack Blocker settings.
    • Specify the IP addresses of computers whose network activity will not be blocked.

    Configure the following settings in the FileVault Disk Encryption section

    • Enable or disable FileVault disk encryption management for client computers.
    • Encrypt or decrypt startup disk on client computers.

      If the Enable FileVault disk encryption management checkbox is unselected, users with administrator rights can encrypt and decrypt their Mac startup disks from System Preferences.

      If the Enable FileVault disk encryption management checkbox and the Encrypt disk option are selected, users with administrator can't decrypt the startup disk of their Mac from System Preferences.

      If the Enable FileVault disk encryption management checkbox and the Decrypt disk option are selected, users with administrator rights can't encrypt the startup disk of their Mac from System Preferences.

    Configure the following settings in the Update section

    • Enable or disable updating application modules.
    • Enable or disable copying of update files to a specific folder.
    • Specify the folder to which the application will copy update files.
    • Specify update sources.

    Configure the following settings in the KSN section

    • Read the KSN statement.
    • Enable or disable the use of Kaspersky Security Network
    • Enable or disable the use of KSN proxy.

    Configure the following settings in the User Interaction section

    • Enable or disable event notifications.
    • Select how Kaspersky Endpoint Security will notify the user about events.
    • Enable or disable displaying the Kaspersky Endpoint Security icon in the menu bar.
    • Enable or disable displaying the Quit item in the shortcut menu of the Kaspersky Endpoint Security icon on the client computer.
    • Select the language used to display Kaspersky Security Center events.
    • Configure Kaspersky Endpoint Security settings available to users of the client computer.

    Configure the following settings in the Network section

    • Enable or disable the use of a proxy server.
    • Specify the proxy server address.
    • Enable or disable the use of a proxy server for local addresses.
    • Specify the user name and password for proxy server authentication.

    Configure the following settings in the Reports section

    • Enable or disable saving of non-critical events in the report.
    • Enable or disable saving of recent events only.
    • Enable or disable removal of events after the specified period.
    • Specify the period for storing events.
    • Enable or disable removal of objects from Backup after the specified period.
    • Specify the period for storing objects in Backup.
  7. Click OK to save changes and close the policy properties window.
Page top

[Topic kes127780]

Change the policy status

A policy status defines the operation of a policy. The policy can have active, out-of-office, or inactive statuses. You can change the policy status in policy settings.

Change the policy status

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Policies tab.
  6. Right-click the policy whose state you want to change and choose Properties from the context menu.
  7. In the Properties: <Policy name> window, select the General section.
  8. In the Policy status section, select one of the following policy statuses:
    • Active policy. The policy is always applied to the selected administration group.
    • Out-of-office policy. The policy is applied to the selected administration group when client computers are disconnected from the corporate network.
    • Inactive policy. The policy is not applied to the selected administration group.
  9. Click OK to save changes and close the Properties: <Policy name> window.
Page top

[Topic kes127783]

Export a policy to a KLP file

You can export a customized policy to a file to use this policy on another Administration Server.

Export a policy to a KLP file

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Policies tab.
  6. Right-click the policy to display its context menu and choose Export.

    The Save As window opens.

  7. Select the folder in which you want to save the KLP file of the policy.
  8. Specify the file name.
  9. Click Save to save the file in the selected folder.
Page top

[Topic kes127781]

Import a policy from a KLP file

You can import an existing policy with predefined settings from a file.

Import a policy from a KLP file

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. In the workspace, select the Policies tab.
  6. Open the file selection window in one of the following ways:
    • By clicking the Import policy from file button.
    • By right-clicking an empty area in the workspace to open the context menu and selecting the Import item.
  7. Select a KLP file with a policy and click the Open button.

The imported policy is added to the list of policies in the workspace.

Page top

[Topic kes133326]

Create and manage policy profiles

A policy profile is a named set of variable settings for a policy, which is activated on a client computer when specific conditions are met. Activation of a profile modifies the policy settings that are active on the device right before the policy profile is activated.

Create a policy profile

  1. In the console tree, select the administration group for which you want to create a policy profile.
  2. In the workspace of the group, open the Policies tab.
  3. Do one of the following to open the properties of the policy for which you want to create a profile:
    • Double-click the name of the policy.
    • Right-click the policy name to display the context menu and choose Properties.
  4. Open the Policy profiles section of the Properties: <Policy name> window.
  5. Click the Add button.
  6. In the Assign policy profiles window, read the information about policies and click the Next button.

    If you don't want this window to display when you create new policy profiles, select the Do not show this window again checkbox before clicking the Next button.

  7. In the Policy profile name window, configure the policy profile:
    • Enter the name of the new policy profile.
  8. The name of a profile cannot include more than 100 characters.
    • In the Policy profile state section, select whether the policy profile is enabled or disabled.
    • In the drop-down list in the Policy profile state section, select whether editing of the policy profile is locked or allowed.
    • If you want to configure activation rules for the policy profile, select the After closing the New Policy Profile Wizard, proceed to configuring the policy profile activation rule checkbox.
  9. Click the Finish button.
  10. Configure the profile settings in the relevant sections as appropriate.
  11. After you have configured the profile and created the activation rules, click OK to save the changes.

The policy profile that you created appears in the Policy profiles section of the policy properties.

Modify a policy profile

  1. In the console tree, select the administration group for which you want to modify a policy profile.
  2. In the workspace of the group, open the Policies tab.
  3. Do one of the following to open the properties of the policy for which you want to modify a profile:
    • Double-click the name of the policy.
    • Right-click the policy name to display the context menu and choose Properties.
  4. Open the Policy profiles section of the Properties: <Policy name> window.
  5. Select the profile that you want to modify and click Properties.
  6. Configure the profile in the properties window:
    • If necessary, in the General section, rename the profile or enable/disable the profile by selecting/deselecting the Enable profile checkbox.
    • In the Activation rules section, edit the activation rules.
    • In the Devices section, choose the devices to which the policy profile is applied.
    • Edit the policy settings in the relevant sections.
  7. Click OK.

If the policy profile is active, the modified settings will be applied after the client computer is synchronized with Administration Server. If the policy profile is inactive, they will be applied after the activation rule is triggered.

Change the priority of a policy profile

  1. In the console tree, select the administration group for which you want to change the priority of a policy profile.
  2. In the workspace of the group, open the Policies tab.
  3. Do one of the following to open the properties of the policy for which you want to change the priority of a policy profile:
    • Double-click the name of the policy.
    • Right-click the policy name to display the context menu and choose Properties.
  4. Open the Policy profiles section of the Properties: <Policy name> window.
  5. Select the policy profile whose priority you want to change.
  6. Raise/lower the priority of the selected profile by clicking the / buttons.

Delete a policy profile

  1. In the console tree, select the administration group for which you want to delete a policy profile.
  2. In the workspace of the group, open the Policies tab.
  3. Do one of the following to open the properties of the policy for which you want to delete a profile:
    • Double-click the name of the policy.
    • Right-click the policy name to display the context menu and choose Properties.
  4. Open the Policy profiles section of the Properties: <Policy name> window.
  5. Select the profile that you want to delete and click the Delete button.

For detailed information about policy profiles, see Kaspersky Security Center Help.

Page top

[Topic kes127867]

Generate a report on detected objects

Generate a report on detected objects

  1. Start Administration Console of Kaspersky Security Center.
  2. Expand the Administration Server <Server name> node.
  3. In the console tree, select the Managed devices node.
  4. Select the administration group that contains the required client computer.
  5. Select the Devices tab.
  6. Select the computer from the list of client computers.
  7. Open the Properties: <Computer name> window in one of the following ways:
    • Double-click the name of the client computer.
    • Right-click the client computer and choose Properties from the context menu.
  8. Select the Protection section.
  9. Generate a report by clicking the View threats report link in the workspace.

The generated report opens in a browser window.

You can find information about other ways to generate a report on objects detected by the application on the client computer in Kaspersky Security Center Help.

Page top

[Topic kes68247]

How to get technical support

If you can't find a solution to your issue in the application documentation or in any of the sources of information about the application, contact Technical Support. Technical Support specialists will answer all your questions about installing and using the application.

Before contacting Technical Support, please read the support rules.

You can contact Technical Support in one of the following ways:

Technical support is available only to users who purchased a commercial license. Users who have received a trial license are not entitled to technical support.

Page top

[Topic kes68417]

Technical Support via Kaspersky CompanyAccount

Kaspersky CompanyAccount is a portal for companies that use Kaspersky Lab applications. The Kaspersky CompanyAccount portal is designed to facilitate interaction between users and Kaspersky Lab specialists through online requests. You can use Kaspersky CompanyAccount to track the status of your online requests and store a history of them as well.

You can register all of your organization's employees under a single account on Kaspersky CompanyAccount. A single account lets you centrally manage electronic requests from registered employees to Kaspersky Lab and also manage the privileges of these employees via Kaspersky CompanyAccount.

The Kaspersky CompanyAccount portal is available in the following languages:

  • English
  • Spanish
  • Italian
  • German
  • Polish
  • Portuguese
  • Russian
  • French
  • Japanese

To learn more about Kaspersky CompanyAccount, visit the Technical Support website.

Page top

[Topic kes73375]

Use a trace file

After you report a problem to Kaspersky Lab Technical Support specialists, they may ask you to generate a report with information about the operation of Kaspersky Endpoint Security and send it to Kaspersky Lab Technical Support. Technical Support specialists may also ask you to create a trace file. The trace file makes it possible to perform a step-by-step examination of the execution of application commands and determine when errors occur.

Page top

[Topic kes59664]

Create a trace file

Tracing is an effective way of recording detailed information about application activity. Technical Support specialists use trace files to troubleshoot issues.

Create a trace file

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Reports tab, in the Traces section, select the Enable tracing checkbox.

Important: It is recommended to enable tracing only if asked by a Kaspersky Lab Technical Support specialist.

Trace files may require a lot of disk space. When you no longer need trace files, disable tracing.

Disable tracing

  1. Open the main application window.
  2. On the navigation panel in the upper pane of the main application window, click the button.

    The application preferences window opens.

  3. On the Reports tab, in the Traces section, deselect the Enable tracing checkbox.

Kaspersky Endpoint Security saves the following information in a trace file:

  • Information about the anti-virus protection status of the Computer, as well as all detected objects and actions (including the name of the detected object, date and time of detection, the web address from which it was downloaded, the names and sizes of infected files and paths to them, the IP address of the attacking computer and the number of the Computer port targeted by the network attack, list of malware activity, and unwanted web addresses) and the decisions taken by the Software and the user on them.
  • Information about applications downloaded by the user (web address, attributes, file size, and information about the process that downloaded the file).
  • Information about the applications launched and their modules (size, attributes, creation date, PE header details, region, name, location, and packers).
  • Information about interface errors and usage of the interface of the installed Kaspersky Lab Software.
  • Information about network connections, including the IP address of the remote computer and the user's Computer, the numbers of ports through which the connection was established, and the network protocol of the connection.
  • Information about network packets received and sent by the Computer over IT and telecom networks.
  • Information about email and instant messages sent and received.
  • Information about web addresses visited, including when the connection was established using an open protocol, data on the website access login and password, and the content of cookies.
  • Server public certificate.
Page top

[Topic kes98365]

Collect information for Technical Support

For more effective support and troubleshooting of application problems, Technical Support specialists may ask you to change application preferences temporarily for purposes of debugging during diagnostics. This may require doing the following:

  • Activating the functionality that gathers extended diagnostic information.
  • Fine-tuning the preferences of individual application components, which are not available via standard user interface elements.
  • Changing the preferences of transmission of diagnostic information that is gathered.

Technical Support representatives will provide you will all the information needed to perform the listed operations and inform you about the scope of data to be gathered for debugging purposes. After the extended diagnostic information is collected, it is saved on the user's computer. The collected data is not sent to Kaspersky Lab automatically.

Page top

[Topic kes59238]

Sources of information to research on your own

You can use the following sources of information about Kaspersky Endpoint Security to research on your own:

  • Kaspersky Endpoint Security page on the Kaspersky Lab website
  • Kaspersky Endpoint Security page on the Technical Support website (Knowledge Base)
  • Help materials included with the application

If you cannot find the solution to an issue on your own, we recommend that you contact Technical Support.

Note: An Internet connection is required for access to website resources.

Kaspersky Endpoint Security page on the Kaspersky Lab website

On the Kaspersky Endpoint Security page you can view general information about the application and its functions and features.

The Kaspersky Endpoint Security page contains a link to the online store, where you can buy or renew your license for the application.

Kaspersky Endpoint Security page in the Knowledge Base

The Knowledge Base is a section on the Kaspersky Lab Technical Support website.

On the Kaspersky Endpoint Security page in the Knowledge Base you can read articles that provide useful information, recommendations, and answers to frequently asked questions on how to purchase, install, and use the application.

Articles in the Knowledge Base may provide answers to questions that relate both to Kaspersky Endpoint Security as well as to other Kaspersky Lab applications. Articles in the Knowledge Base may also contain news from Technical Support.

Help materials included with the application

The application includes full help and context help.

Full help provides information on how to configure and use Kaspersky Endpoint Security.

Context help provides information about Kaspersky Endpoint Security windows, describes Kaspersky Endpoint Security settings and contains links to task descriptions where those settings are used.

Help can be included in the distribution kit or located on the Kaspersky Lab website. An Internet connection is required for viewing online help.

Online help

In the Administrator's Guide, you can find information on how to:

  • Prepare for the installation of the application, install and activate the application.
  • Configure and use the application.
  • Remotely manage the application via Kaspersky Security Center.
Page top

[Topic kes35700]

Discuss Kaspersky Lab applications on the Forum

If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users on our forum.

On the forum you can view discussion topics, post your comments, and create new discussion topics.

Go to the Forum from the Help pull-down menu

  1. In the main application window, click the button.
  2. Click the Forum button.
Page top

[Topic kes24414]

Appendices

This section provides information that complements the document text.

In this section

Warnings and restrictions

List of objects scanned by extension

Masks in paths to files and folders

Page top

[Topic kes140466]

Warnings and restrictions

If an application that collects information and sends it to be processed is installed on your computer, Kaspersky Endpoint Security may classify this application as malware. To avoid this, you can exclude the application from scanning by configuring Kaspersky Endpoint Security as described in this document.

Application functional settings can be modified by editing configuration files.

Page top

[Topic kes24413]

List of objects scanned by extension

If in the virus scan task preferences you selected the Scan applications and documents by extension option, Kaspersky Endpoint Security performs virus scans on objects without extensions and objects with the following extensions:

General formats:

  • txt
  • csv
  • htm
  • html

Multimedia (audio/video) files:

  • flv
  • f4v
  • avi
  • 3gp
  • 3g2
  • 3gp2
  • 3p2
  • divx
  • mp4
  • mkv
  • mov
  • qt
  • asf
  • wmv
  • rm
  • rmvb
  • vob
  • dat
  • mpg
  • mpeg
  • bik
  • fcs
  • mp3
  • mpeg3
  • flac
  • ape
  • ogg
  • aac
  • m4a
  • wma
  • ac3
  • wav
  • mka
  • rm
  • ra
  • ravb
  • mid
  • midi
  • cda

Image files:

  • jpg
  • jpe
  • jpeg
  • jff
  • gif
  • png
  • bmp
  • tif
  • tiff
  • emf
  • wmf
  • eps
  • psd
  • cdr
  • swf

Executable and system files:

  • exe
  • dll
  • scr
  • ocx
  • com
  • sys
  • class
  • o
  • so
  • elf
  • prx
  • vb
  • vbs
  • js
  • bat
  • cmd
  • msi
  • deb
  • rpm
  • sh
  • pl
  • dylib

Documents and templates:

  • doc
  • dot
  • docx
  • dotx
  • docm
  • dotm
  • xsl
  • xls
  • xlsx
  • xltx
  • xlsm
  • xltm
  • xlam
  • xlsb
  • ppt
  • pot
  • pps
  • pptx
  • potx
  • pptm
  • potm
  • ppsx
  • ppsm
  • rtf
  • pdf
  • msg
  • eml
  • vsd
  • vss
  • vst
  • vdx
  • vsx
  • vtx
  • xps
  • oxps
  • one
  • onepkg
  • xsn
  • odt
  • ods
  • odp
  • sxw
  • pub
  • mdb
  • accdb
  • accde
  • accdr
  • accdc
  • chm
  • mht

Archives:

  • zip
  • 7z*
  • 7-z
  • rar
  • iso
  • cab
  • jar
  • bz
  • bz2
  • tbz
  • tbz2
  • gz
  • tgz
  • arj
  • dmg
  • smi
  • img
  • xar

Note: The actual format of a file may not match its file name extension.

Page top

[Topic kes24412]

Masks in paths to files and folders

You can use the tilde symbol (~) when you specify the protection scope, scan scope, and Trusted Zone.

The ~ symbol in the path to a file or folder replaces /Users/<user name>. For example, the path ~/Desktop means that the protection scope includes Desktop folders of all users on computers that you want to protect.

Page top

[Topic kes34744]

AO Kaspersky Lab

Kaspersky Lab is a world-renowned vendor of systems protecting computers against digital threats, including viruses and other malware, unsolicited email (spam), and network and hacking attacks.

In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred vendor of computer protection systems for home users in Russia (IDC Endpoint Tracker 2014).

Kaspersky Lab was founded in Russia in 1997. It has since grown into an international group of companies with 38 offices in 33 countries. The company employs more than 3,000 skilled professionals.

Products. Kaspersky Lab products provide protection for all systems, from home computers to large corporate networks.

The personal product range includes security applications for desktop, laptop, and tablet computers, smartphones and other mobile devices.

The company offers protection and control solutions and technologies for workstations and mobile devices, virtual machines, file and web servers, mail gateways, and firewalls. The company's portfolio also features specialized products providing protection against DDoS attacks, protection for industrial control systems, and prevention of financial fraud. Used in conjunction with centralized management tools, these solutions ensure effective automated protection for companies and organizations of any size against computer threats. Kaspersky Lab products are certified by major test laboratories, compatible with software from diverse vendors, and optimized to run on many hardware platforms.

Kaspersky Lab virus analysts work around the clock. Every day they uncover hundreds of thousands of new computer threats, create tools to detect and disinfect them, and include their signatures in databases used by Kaspersky Lab applications.

Technologies. Many technologies that are now part and parcel of modern anti-virus tools were originally developed by Kaspersky Lab. It is no coincidence that many other developers use the Kaspersky Anti-Virus engine in their products, including: Alcatel-Lucent, Alt-N, Asus, BAE Systems, Blue Coat, Check Point, Cisco Meraki, Clearswift, D-Link, Facebook, General Dynamics, H3C, Juniper Networks, Lenovo, Microsoft, NETGEAR, Openwave Messaging, Parallels, Qualcomm, Samsung, Stormshield, Toshiba, Trustwave, Vertu, and ZyXEL. Many of the company’s innovative technologies are patented.

Achievements. Over the years, Kaspersky Lab has won hundreds of awards for its services in combating computer threats. Following tests and research conducted by the reputed Austrian test laboratory AV-Comparatives in 2014, Kaspersky Lab ranked among the top two vendors by the number of Advanced+ certificates earned and was ultimately awarded the Top Rated certificate. But Kaspersky Lab's main achievement is the loyalty of its users worldwide. The company’s products and technologies protect more than 400 million users, and its corporate clients number more than 270,000.

 

Kaspersky Lab website:

https://www.kaspersky.com

Virus encyclopedia:

https://securelist.com

Virus Lab:

https://virusdesk.kaspersky.com (for analyzing suspicious files and websites)

Kaspersky Lab’s web forum:

https://forum.kaspersky.com

 

Page top

[Topic kes56776]

Information about third-party code

Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.

Page top

[Topic kes92067]

Trademark notices

Registered trademarks and service marks are the property of their respective owners.

Apple, FileVault, Finder, Mac, Mac Pro, macOS, OS X, and Safari are trademarks of Apple Inc., registered in the U.S. and other countries.

Chrome is a trademark of Google, Inc.

Intel is a trademark of Intel Corporation in the U.S. and/or other countries.

Excel is a registered trademark of Microsoft Corporation in the United States and other countries.

Firefox is a trademark of the Mozilla Foundation.

Page top