Contents
- Monitoring and reporting
- Scenario: Monitoring and reporting
- About types of monitoring and reporting
- Dashboard and widgets
- Reports
- Events and event selections
- Using event selections
- Creating an event selection
- Editing an event selection
- Viewing a list of an event selection
- Viewing details of an event
- Exporting events to a file
- Viewing an object history from an event
- Deleting events
- Deleting event selections
- Setting the storage term for an event
- Event types
- Blocking frequent events
- Notifications and device statuses
- Kaspersky announcements
- Viewing information about the detects of threats
Monitoring and reporting
This section describes the monitoring and reporting capabilities of Kaspersky Security Center. These capabilities give you an overview of your infrastructure, protection statuses, and statistics.
After Kaspersky Security Center deployment or during the operation, you can configure the monitoring and reporting features to best suit your needs.
Scenario: Monitoring and reporting
This section provides a scenario for configuring the monitoring and reporting feature in Kaspersky Security Center.
Prerequisites
After you deploy Kaspersky Security Center in an organization's network you can start to monitor it and generate reports on its functioning.
Monitoring and reporting in an organization's network proceeds in stages:
- Configuring the switching of device statuses
Get acquainted with the settings for device statuses depending on specific conditions. By changing these settings, you can change the number of events with Critical or Warning importance levels. When configuring the switching of device statuses, be sure of the following:
- New settings do not conflict with the information security policies of your organization.
- You are able to react to important security events in your organization's network in a timely manner.
- Configuring notifications about events on client devices
How-to instructions:
- Changing the response of your security network to the Virus outbreak event
You can change the specific thresholds in the Administration Server properties. You can also create a stricter policy that will be activated or create a task that will be run at the occurrence of this event.
- Performing recommended actions for Critical and Warning notifications
How-to instructions:
- Reviewing the security status of your organization's network
How-to instructions:
- Locating client devices that are not protected
How-to instructions:
- Checking protection of client devices
How-to instructions:
- Evaluating and limiting the event load on the database
Information about events that occur during operation of managed applications is transferred from a client device and registered in the Administration Server database. To reduce the load on the Administration Server, evaluate and limit the maximum number of events that can be stored in the database.
How-to instructions:
- Reviewing license information
How-to instructions:
Results
Upon completion of the scenario, you are informed about protection of your organization's network and, thus, can plan actions for further protection.
About types of monitoring and reporting
Information on security events in an organization's network is stored in the Administration Server database. Based on the events, Kaspersky Security Center 13.1 Web Console provides the following types of monitoring and reporting in your organization's network:
- Dashboard
- Reports
- Event selections
- Notifications
Dashboard
The dashboard allows you to monitor security trends on your organization's network by providing you with a graphical display of information.
Reports
The Reports feature allows you to get detailed numerical information about the security of your organization's network, save this information to a file, send it by email, and print it.
Event selections
Event selections provide an onscreen view of named sets of events that are selected from the Administration Server database. These sets of events are grouped according to the following categories:
- By importance level—Critical events, Functional failures, Warnings, and Info events
- By time—Recent events
- By type—User requests and Audit events
You can create and view user-defined event selections based on the settings available, in the Kaspersky Security Center 13.1 Web Console interface, for configuration.
Notifications
Notifications alert you about events and help you to speed up your responses to these events by performing recommended actions or actions you consider as appropriate.
Page topDashboard and widgets
This section contains information about the dashboard and the widgets that the dashboard provides. The section includes instructions on how to manage widgets and configure widget settings.
Using the dashboard
The dashboard allows you to monitor security trends on your organization's network by providing you with a graphical display of information.
The dashboard is available in the Kaspersky Security Center 13.1 Web Console, in the MONITORING & REPORTING section, by clicking DASHBOARD.
The dashboard provides widgets that can be customized. You can choose a large number of different widgets, presented as pie charts or donut charts, tables, graphs, bar charts, and lists. The information displayed in widgets is automatically updated, the update period is one to two minutes. The interval between updates varies for different widgets. You can refresh data on a widget manually at any time by means of the settings menu.
By default, widgets include information about all events stored in the database of Administration Server.
Kaspersky Security Center 13.1 Web Console has a default set of widgets for the following categories:
- Protection status
- Deployment
- Updating
- Threat statistics
- Other
Some widgets have text information with links. You can view detailed information by clicking a link.
When configuring the dashboard, you can add widgets that you need, hide widgets that you do not need, change the size or appearance of widgets, move widgets, and change their settings.
Adding widgets to the dashboard
To add widgets to the dashboard:
- In the main menu, go to MONITORING & REPORTING → DASHBOARD.
- Click the Add or restore web widget button.
- In the list of available widgets, select the widgets that you want to add to the dashboard.
Widgets are grouped by category. To view the list of widgets included in a category, click the chevron icon (
) next to the category name.
- Click the Add button.
The selected widgets are added at the end of the dashboard.
You can now edit the representation and parameters of the added widgets.
Hiding a widget from the dashboard
To hide a displayed widget from the dashboard:
- In the main menu, go to MONITORING & REPORTING → DASHBOARD.
- Click the settings icon (
) next to the widget that you want to hide.
- Select Hide web widget.
- In the Warning window that opens, click OK.
The selected widget is hidden. Later, you can add this widget to the dashboard again.
Moving a widget on the dashboard
To move a widget on the dashboard:
- In the main menu, go to MONITORING & REPORTING → DASHBOARD.
- Click the settings icon (
) next to the widget that you want to move.
- Select Move.
- Click the place to which you want to move the widget. You can select only another widget.
The places of the selected widgets are swapped.
Changing the widget size or appearance
For widgets that display a graph, you can change its representation—a bar chart or a line chart. For some widgets, you can change their size: compact, medium, or maximum.
To change the widget representation:
- In the main menu, go to MONITORING & REPORTING → DASHBOARD.
- Click the settings icon (
) next to the widget that you want to edit.
- Do one of the following:
- To display the widget as a bar chart, select Chart type: Bars.
- To display the widget as a line chart, select Chart type: Lines.
- To change the area occupied by the widget, select one of the values:
- Compact
- Compact (bar only)
- Medium (donut chart)
- Medium (bar chart)
- Maximum
The representation of the selected widget is changed.
Changing widget settings
To change settings of a widget:
- In the main menu, go to MONITORING & REPORTING → DASHBOARD.
- Click the settings icon (
) next to the widget that you want to change.
- Select Show settings.
- In the widget settings window that opens, change the widget settings as required.
- Click Save to save the changes.
The settings of the selected widget are changed.
The set of settings depends on the specific widget. Below are some of the common settings:
- Web widget scope (the set of objects for which the widget displays information)—for example, an administration group or device selection.
- Select task (the task for which the widget displays information).
- Time interval (the time interval during which the information is displayed in the widget)—between the two specified dates; from the specified date to the current day; or from the current day minus the specified number of days to the current day.
- Set to Critical if these are specified and Set to Warning if these are specified (the rules that determine the color of a traffic light).
Reports
This section describes how to use reports, manage custom report templates, use report templates to generate new reports, and create report delivery tasks.
Using reports
The Reports feature allows you to get detailed numerical information about the security of your organization's network, save this information to a file, send it by email, and print it.
Reports are available in the Kaspersky Security Center 13.1 Web Console, in the MONITORING & REPORTING section, by clicking REPORTS.
By default, reports include information for the last 30 days.
Kaspersky Security Center has a default set of reports for the following categories:
- Protection status
- Deployment
- Updating
- Threat statistics
- Other
You can create custom report templates, edit report templates, and delete them.
You can create reports that are based on existing templates, export reports to files, and create tasks for report delivery.
Creating a report template
To create a report template:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- Click Add.
The New Report Template Wizard starts. Proceed through the Wizard by using the Next button.
- On the first page of the Wizard, enter the report name and select the report type.
- On the Scope page of the Wizard, select the set of client devices (administration group, device selection, selected devices, or all networked devices) whose data will be displayed in reports that are based on this report template.
- On the Reporting period page of the Wizard, specify the report period. Available values are as follows:
- Between the two specified dates
- From the specified date to the report creation date
- From the report creation date, minus the specified number of days, to the report creation date
This page may not appear for some reports.
- Click OK to close the Wizard.
- Do one of the following:
- Click the Save and run button to save the new report template and to run a report based on it.
The report template is saved. The report is generated.
- Click the Save button to save the new report template.
The report template is saved.
- Click the Save and run button to save the new report template and to run a report based on it.
You can use the new template for generating and viewing reports.
Viewing and editing report template properties
You can view and edit basic properties of a report template, for example, the report template name or the fields displayed in the report.
To view and edit properties of a report template:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- Select the check box next to the report template whose properties you want to view and edit.
As an alternative, you can first generate the report, and then click the Edit button.
- Click the Open report template properties button.
The Editing report <Report name> window opens with the General tab selected.
- Edit the report template properties:
- General tab:
- Report template name
- Maximum number of entries to display
- Group
Click the Settings button to change the set of client devices for which the report is created. For some types of the reports, the button may be unavailable. The actual settings depend on the settings specified during creation of the report template.
- Time interval
Click the Settings button to modify the report period. For some types of the reports, the button may be unavailable. Available values are as follows:
- Between the two specified dates
- From the specified date to the report creation date
- From the report creation date, minus the specified number of days, to the report creation date
- Include data from secondary and virtual Administration Servers
- Up to nesting level
- Data wait interval (min)
- Cache data from secondary Administration Servers
- Cache update frequency (h)
- Transfer detailed information from secondary Administration Servers
- Fields tab
Select the fields that will be displayed in the report, and use the Move up button and Move down button to change the order of these fields. Use the Add button or Edit button to specify whether the information in the report must be sorted and filtered by each of the fields.
In the Filters of Details fields section, you can also click the Convert filters button to start using the extended filtering format. This format enables you to combine filtering conditions specified in various fields by using the logical OR operation. After you click the button, the Convert filters panel opens on the right. Click the Convert filters button to confirm conversion. You can now define a converted filter with conditions from the Details fields section that are applied by using the logical OR operation.
Conversion of a report to the format supporting complex filtering conditions will make the report incompatible with the previous versions of Kaspersky Security Center (11 and earlier). Also, the converted report will not contain any data from secondary Administration Servers running such incompatible versions.
- General tab:
- Click Save to save the changes.
- Close the Editing report <Report name> window.
The updated report template appears in the list of report templates.
Page topExporting a report to a file
You can export a report to an XML, HTML, or PDF file.
To export a report to a file:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- Select the check box next to the report that you want to export to a file.
- Click the Export report button.
- In the window that opens, change the report file name in the Name field. By default, the file name coincides with the name of the selected report template.
- Select the report file type: XML, HTML, or PDF.
- Click the Export report button.
The report in selected format will be downloaded to your device—to the default folder of your device—or a standard Save as window in your browser will open to let you save the file where you want.
The report is saved to the file.
Generating and viewing a report
To create and view a report:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- Click the name of the report template that you want to use to create a report.
A report using the selected template is generated and displayed.
Report data is displayed according to the localization set for the Administration Server.
The report displays the following data:
- On the Summary tab:
- The name and type of report, a brief description and the reporting period, as well as information about the group of devices for which the report is generated.
- Graph chart showing the most representative report data.
- Consolidated table with calculated report indicators.
- On the Details tab, a table with detailed report data is displayed.
Creating a report delivery task
You can create a task that will deliver selected reports.
To create a report delivery task:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- [Optional] Select the check boxes next to the report templates for which you want to create a report delivery task.
- Click the New report delivery task button.
- The Add Task Wizard starts. Proceed through the Wizard by using the Next button.
- On the first page of the Wizard, enter the task name. The default name is Deliver reports (<N>), where <N> is the sequence number of the task.
- On the task settings page of the Wizard, specify the following settings:
- Report templates to be delivered by the task. If you selected them at step 2, skip this step.
- The report format: HTML, XLS, or PDF.
- Whether the reports are to be sent by email, together with email notification settings.
- Whether the reports are to be saved to a folder, whether previously saved reports in this folder are to be overwritten, and whether a specific account is to be used to access the folder (for a shared folder).
- If you want to modify other task settings after the task is created, on the Finish task creation page of the Wizard enable the Open task details when creation is complete option.
- Click the Create button to create the task and close the Wizard.
The report delivery task is created. If you enabled the Open task details when creation is complete option, the task settings window opens.
Deleting report templates
To delete one or several report templates:
- In the main menu, go to MONITORING & REPORTING → REPORTS.
- Select check boxes next to the report templates that you want to delete.
- Click the Delete button.
- In the window that opens, click OK to confirm your selection.
The selected report templates are deleted. If these report templates were included in the report delivery tasks, they are also removed from the tasks.
Events and event selections
This section provides information about events and event selections, about the types of events that occur in Kaspersky Security Center components, and about managing frequent events blocking.
Using event selections
Event selections provide an onscreen view of named sets of events that are selected from the Administration Server database. These sets of events are grouped according to the following categories:
- By importance level—Critical events, Functional failures, Warnings, and Info events
- By time—Recent events
- By type—User requests and Audit events
You can create and view user-defined event selections based on the settings available, in the Kaspersky Security Center 13.1 Web Console interface, for configuration.
Event selections are available in the Kaspersky Security Center 13.1 Web Console, in the MONITORING & REPORTING section, by clicking EVENT SELECTIONS.
By default, event selections include information for the last seven days.
Kaspersky Security Center has a default set of event (predefined) selections:
- Events with different importance levels:
- Critical events
- Functional failures
- Warnings
- Informational messages
- User requests (events of managed applications)
- Recent events (over the last week)
- Audit events.
You can also create and configure additional user-defined selections. In user-defined selections, you can filter events by the properties of the devices they originated from (device names, IP ranges, and administration groups), by event types and severity levels, by application and component name, and by time interval. It is also possible to include task results in the search scope. You can also use a simple search field where a word or several words can be typed. All events that contain any of the typed words anywhere in their attributes (such as event name, description, component name) are displayed.
Both for predefined and user-defined selections, you can limit the number of displayed events or the number of records to search. Both options affect the time it takes Kaspersky Security Center to display the events. The larger the database is, the more time-consuming the process can be.
You can do the following:
- Edit properties of event selections
- Generate event selections
- View details of event selections
- Delete event selections
- Delete events from the Administration Server database
Creating an event selection
To create an event selection:
- In the main menu, go to MONITORING & REPORTING → EVENT SELECTIONS.
- Click Add.
- In the New event selection window that opens, specify the settings of the new event selection. Do this in one or more of the sections in the window.
- Click Save to save the changes.
The confirmation window opens.
- To view the event selection result, keep the Go to selection result check box selected.
- Click Save to confirm the event selection creation.
If you kept the Go to selection result check box selected, the event selection result is displayed. Otherwise, the new event selection appears in the list of event selections.
Editing an event selection
To edit an event selection:
- In the main menu, go to MONITORING & REPORTING → EVENT SELECTIONS.
- Select the check box next to the event selection that you want to edit.
- Click the Properties button.
An event selection settings window opens.
- Edit the properties of the event selection.
For predefined event selections, you can edit only the properties on the following tabs: General (except for the selection name), Time, and Access rights.
For user-defined selections, you can edit all properties.
- Click Save to save the changes.
The edited event selection is shown in the list.
Viewing a list of an event selection
To view an event selection:
- In the main menu, go to MONITORING & REPORTING → EVENT SELECTIONS.
- Select the check box next to the event selection that you want to start.
- Do one of the following:
- If you want to configure sorting in the event selection result, do the following:
- Click the Reconfigure sorting and start button.
- In the displayed Reconfigure sorting for event selection window, specify the sorting settings.
- Click the name of the selection.
- Otherwise, if you want to view the list of events as they are sorted on the Administration Server, click the name of the selection.
- If you want to configure sorting in the event selection result, do the following:
The event selection result is displayed.
Viewing details of an event
To view details of an event:
- Start an event selection.
- Click the time of the required event.
The Event properties window opens.
- In the displayed window, you can do the following:
- View the information about the selected event
- Go to the next event and the previous event in the event selection result
- Go to the device on which the event occurred
- Go to the administration group that includes the device on which the event occurred
- For an event related to a task, go to the task properties
Exporting events to a file
To export events to a file:
- Start an event selection.
- Select the check box next to the required event.
- Click the Export to file button.
The selected event is exported to a file.
Viewing an object history from an event
From an event of creation or modification of an object that supports revision management, you can switch to the revision history of the object.
To view an object history from an event:
- Start an event selection.
- Select the check box next to the required event.
- Click the Revision history button.
The revision history of the object is opened.
Deleting events
To delete one or several events:
- Start an event selection.
- Select the check boxes next to the required events.
- Click the Delete button.
The selected events are deleted and cannot be restored.
Deleting event selections
You can delete only user-defined event selections. Predefined event selections cannot be deleted.
To delete one or several event selections:
- In the main menu, go to MONITORING & REPORTING → EVENT SELECTIONS.
- Select the check boxes next to the event selections that you want to delete.
- Click Delete.
- In the window that opens, click OK.
The event selection is deleted.
Setting the storage term for an event
Kaspersky Security Center allows you to receive information about events that occur during the operation of Administration Server and Kaspersky applications installed on managed devices. Information about events is saved in the Administration Server database. You might need to store some events for a longer or shorter period of time than specified by default values. You can change the default settings of the storage term for an event.
If you are not interested in storing some events in the database of Administration Server, you can disable the appropriate setting in the Administration Server policy and Kaspersky application policy, or in the Administration Server properties (only for Administration Server events). This will reduce the number of event types in the database.
The longer the storage term for an event, the faster the database reaches its maximum capacity. However, a longer storage term for an event lets you perform monitoring and reporting tasks for a longer period of time.
To set the storage term for an event in the database of Administration Server:
- Select DEVICES → POLICIES & PROFILES.
- Do one of the following:
- To configure the storage term of the events of Network Agent or of a managed Kaspersky application, click the name of the corresponding policy.
The policy properties page opens.
- To configure Administration Server events, at the top of the screen, click the settings icon (
) next to the name of the required Administration Server.
If you have a policy for the Administration Server, you can click the name of this policy instead.
The Administration Server properties page (or the Administration Server policy properties page) opens.
- To configure the storage term of the events of Network Agent or of a managed Kaspersky application, click the name of the corresponding policy.
- Select the Event configuration tab.
A list of event types related to the Critical section is displayed.
- Select the Functional failure, Warning, or Info section.
- In the list of event types in the right pane, click the link for the event whose storage term you want to change.
In the Event registration section of the window that opens, the Store in the Administration Server database for (days) option is enabled.
- In the edit box below this toggle button, enter the number of days to store the event.
- If you do not want to store an event in the Administration Server database, disable the Store in the Administration Server database for (days) option.
If you configure Administration Server events in Administration Server properties window and if event settings are locked in the Kaspersky Security Center Administration Server policy, you cannot redefine the storage term value for an event.
- Click OK.
The properties window of the policy is closed.
From now on, when Administration Server receives and stores the events of the selected type, they will have the changed storage term. Administration Server does not change the storage term of previously received events.
Page topEvent types
Each Kaspersky Security Center component has its own set of event types. This section lists types of events that occur in Kaspersky Security Center Administration Server, Network Agent, iOS MDM Server, and Exchange Mobile Device Server. Types of events that occur in Kaspersky applications are not listed in this section.
Data structure of event type description
For each event type, its display name, identifier (ID), alphabetic code, description, and the default storage term are provided.
- Event type display name. This text is displayed in Kaspersky Security Center when you configure events and when they occur.
- Event type ID. This numerical code is used when you process events by using third-party tools for event analysis.
- Event type (alphabetic code). This code is used when you browse and process events by using public views that are provided in the Kaspersky Security Center database and when events are exported to a SIEM system.
- Description. This text contains the situations when an event occurs and what you can do in such a case.
- Default storage term. This is the number of days during which the event is stored in the Administration Server database and is displayed in the list of events on Administration Server. After this period elapses, the event is deleted. If the event storage term value is 0, such events are detected but are not displayed in the list of events on Administration Server. If you configured to save such events to the operating system event log, you can find them there.
You can change the storage term for events:
- Administration Console: Setting the storage term for an event
- Kaspersky Security Center 13.1 Web Console: Setting the storage term for an event
Other data may include the following fields:
- event_id: unique number of the event in the database, generated and assigned automatically; not to be confused with Event type ID.
- task_id: the ID of the task that caused the event (if any)
- severity: one of the following severity levels (in the ascending order of severity):
0) Invalid severity level
1) Info
2) Warning
3) Error
4) Critical
Administration Server events
This section contains information about the events related to the Administration Server.
Administration Server critical events
The table below shows the event types of Kaspersky Security Center Administration Server that have the Critical importance level.
Administration Server critical events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
License limit has been exceeded |
4099 |
KLSRV_EV_LICENSE_CHECK_MORE_110 |
Once a day Kaspersky Security Center checks whether a licensing restriction is exceeded. Events of this type occur when Administration Server detects that some licensing limits are exceeded by Kaspersky applications installed on client devices and if the number of currently used licensing units covered by a single license exceeds 110% of the total number of units covered by the license. Even when this event occurs, client devices are protected. You can respond to the event in the following ways:
Kaspersky Security Center determines the rules to generate events when a licensing restriction is exceeded. |
180 days |
Virus outbreak |
26 (for File Threat Protection) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Virus outbreak |
27 (for Mail Threat Protection) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Virus outbreak |
28 (for firewall) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Device has become unmanaged |
4111 |
KLSRV_HOST_OUT_CONTROL |
Events of this type occur if a managed device is visible on the network but has not connected to Administration Server for a specific period of time. Find out what prevents the proper functioning of Network Agent on the device. Possible causes include network issues and removal of Network Agent from the device. |
180 days |
Device status is Critical |
4113 |
KLSRV_HOST_STATUS_CRITICAL |
Events of this type occur when a managed device is assigned the Critical status. You can configure the conditions under which the device status is changed to Critical. |
180 days |
The key file has been added to the denylist |
4124 |
KLSRV_LICENSE_BLACKLISTED |
Events of this type occur when Kaspersky has added the activation code or key file that you use to the denylist. Contact Technical Support for more details. |
180 days |
Limited functionality mode |
4130 |
KLSRV_EV_LICENSE_SRV_LIMITED_MODE |
Events of this type occur when Kaspersky Security Center starts to operate with basic functionality, without Vulnerability and Patch Management and without Mobile Device Management features. Following are causes of, and appropriate responses to, the event:
|
180 days |
License expires soon |
4129 |
KLSRV_EV_LICENSE_SRV_EXPIRE_SOON |
Events of this type occur when the commercial license expiration date is approaching. Once a day Kaspersky Security Center checks whether a license expiration date is approaching. Events of this type are published 30 days, 15 days, 5 days and 1 day before the license expiration date. You cannot change the number of days. If the Administration Server is turned off on the specified day before the license expiration date, the event will not be published until the next day. When the commercial license expires, Kaspersky Security Center provides only basic functionality. You can respond to the event in the following ways:
|
180 days |
Certificate has expired |
4132 |
KLSRV_CERTIFICATE_EXPIRED |
Events of this type occur when the Administration Server certificate for Mobile Device Management expires. You need to update the expired certificate. You can configure automatic updates of certificates by selecting the Reissue certificate automatically if possible check box in the certificate issuance settings. |
180 days |
Updates for Kaspersky software modules have been revoked |
4142 |
KLSRV_SEAMLESS_UPDATE_REVOKED |
Events of this type occur if seamless updates have been revoked (Revoked status is displayed for these updates) by Kaspersky technical specialists; for example, they must be updated to a newer version. The event concerns Kaspersky Security Center patches and does not concern modules of managed Kaspersky applications. The event provides the reason that the seamless updates are not installed. |
180 days |
Administration Server functional failure events
The table below shows the event types of Kaspersky Security Center Administration Server that have the Functional failure importance level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy. For Administration Server, you can additionally view the event list in the Administration Server properties.
Administration Server functional failure events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
Runtime error |
4125 |
KLSRV_RUNTIME_ERROR |
Events of this type occur because of unknown issues. Most often these are DBMS issues, network issues, and other software and hardware issues. Details of the event can be found in the event description. |
180 days |
Limit of installations has been exceeded for one of the licensed applications groups |
4126 |
KLSRV_INVLICPROD_EXCEDED |
Administration Server generates events of this type periodically (every hour). Events of this type occur if in Kaspersky Security Center you manage license keys of third-party applications and if the number of installations has exceeded the limit set by the license key of the third-party application. You can respond to the event in the following ways:
You can manage license keys of third-party applications using the functionality of licensed applications groups. A licensed applications group includes third-party applications that meet criteria set by you. |
180 days |
Failed to poll the cloud segment |
4143 |
KLSRV_KLCLOUD_SCAN_ERROR |
Events of this type occur when Administration Server fails to poll a network segment in a cloud environment. Read the details in the event description and respond accordingly. |
Not stored |
Failed to copy the updates to the specified folder |
4123 |
KLSRV_UPD_REPL_FAIL |
Events of this type occur when software updates are copied to an additional shared folder(s). You can respond to the event in the following ways:
|
180 days |
No free disk space |
4107 |
KLSRV_DISK_FULL |
Events of this type occur when the hard drive of the device on which Administration Server is installed runs out of free space. Free up disk space on the device. |
180 days |
Shared folder is not available |
4108 |
KLSRV_SHARED_FOLDER_UNAVAILABLE |
Events of this type occur if the shared folder of Administration Server is not available. You can respond to the event in the following ways:
|
180 days |
The Administration Server database is unavailable |
4109 |
KLSRV_DATABASE_UNAVAILABLE |
Events of this type occur if the Administration Server database becomes unavailable. You can respond to the event in the following ways:
|
180 days |
No free space in the Administration Server database |
4110 |
KLSRV_DATABASE_FULL |
Events of this type occur when there is no free space in the Administration Server database. Administration Server does not function when its database has reached its capacity and when further recording to the database is not possible. Following are the causes of this event, depending on the DBMS that you use, and appropriate responses to the event:
|
180 days |
Administration Server warning events
The table below shows the events of Kaspersky Security Center Administration Server that have the Warning importance level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy. For Administration Server, you can additionally view the event list in the Administration Server properties.
Administration Server warning events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
A frequent event has been detected |
|
KLSRV_EVENT_SPAM_EVENTS_DETECTED |
Events of this type occur when Administration Server detects a frequent event on a managed device. Refer to the following section for details: Blocking frequent events. |
90 days |
License limit has been exceeded |
4098 |
KLSRV_EV_LICENSE_CHECK_100_110 |
Once a day Kaspersky Security Center checks whether a licensing restriction is exceeded. Events of this type occur when Administration Server detects that some licensing limits are exceeded by Kaspersky applications installed on client devices and if the number of currently used licensing units covered by a single license constitute 100% to 110% of the total number of units covered by the license. Even when this event occurs, client devices are protected. You can respond to the event in the following ways:
Kaspersky Security Center determines the rules to generate events when a licensing restriction is exceeded. |
90 days |
Device has remained inactive on the network for a long time |
4103 |
KLSRV_EVENT_HOSTS_NOT_VISIBLE |
Events of this type occur when a managed device shows inactivity for some time. Most often, this happens when a managed device is decommissioned. You can respond to the event in the following ways:
|
90 days |
Conflict of device names |
4102 |
KLSRV_EVENT_HOSTS_CONFLICT |
Events of this type occur when Administration Server considers two or more managed devices as a single device. Most often this happens when a cloned hard drive was used for software deployment on managed devices and without switching the Network Agent to the dedicated disk cloning mode on a reference device. To avoid this issue, switch Network Agent to the disk cloning mode on a reference device before cloning the hard drive of this device. |
90 days |
Device status is Warning |
4114 |
KLSRV_HOST_STATUS_WARNING |
Events of this type occur when a managed device is assigned the Warning status. You can configure the conditions under which the device status is changed to Warning. |
90 days |
Limit of installations will soon be exceeded for one of the licensed applications groups |
4127 |
KLSRV_INVLICPROD_FILLED |
Events of this type occur when the number of installations for third-party applications included in a licensed applications group reaches 90% of the maximum allowed value specified in the license key properties. You can respond to the event in the following ways:
You can manage license keys of third-party applications using the functionality of licensed applications groups. |
90 days |
Certificate has been requested |
4133 |
KLSRV_CERTIFICATE_REQUESTED |
Events of this type occur when a certificate for Mobile Device Management fails to be automatically reissued. Following might be the causes and appropriate responses to the event:
|
90 days |
Certificate has been removed |
4134 |
KLSRV_CERTIFICATE_REMOVED |
Events of this type occur when an administrator removes any type of certificate (General, Mail, VPN) for Mobile Device Management. After removing a certificate, mobile devices connected via this certificate will fail to connect to Administration Server. This event might be helpful when investigating malfunctions associated with the management of mobile devices. |
90 days |
APNs certificate has expired |
4135 |
KLSRV_APN_CERTIFICATE_EXPIRED |
Events of this type occur when an APNs certificate expires. You need to manually renew the APNs certificate and install it on an iOS MDM Server. |
Not stored |
APNs certificate expires soon |
4136 |
KLSRV_APN_CERTIFICATE_EXPIRES_SOON |
Events of this type occur when there are fewer than 14 days left before the APNs certificate expires. When the APNs certificate expires, you need to manually renew the APNs certificate and install it on an iOS MDM Server. We recommend that you schedule the APNs certificate renewal in advance of the expiration date. |
Not stored |
Failed to send the FCM message to the mobile device |
4138 |
KLSRV_GCM_DEVICE_ERROR |
Events of this type occur when Mobile Device Management is configured to use Google Firebase Cloud Messaging (FCM) for connecting to managed mobile devices with an Android operating system and FCM Server fails to handle some of the requests received from Administration Server. It means that some of the managed mobile devices will not receive a push notification. Read the HTTP code in the details of the event description and respond accordingly. For more information on the HTTP codes received from FCM Server and related errors, please refer to the Google Firebase service documentation (see chapter "Downstream message error response codes"). |
90 days |
HTTP error sending the FCM message to the FCM server |
4139 |
KLSRV_GCM_HTTP_ERROR |
Events of this type occur when Mobile Device Management is configured to use Google Firebase Cloud Messaging (FCM) for connecting managed mobile devices with the Android operating system and FCM Server reverts to the Administration Server a request with a HTTP code other than 200 (OK). Following might be the causes and appropriate responses to the event:
|
90 days |
Failed to send the FCM message to the FCM server |
4140 |
KLSRV_GCM_GENERAL_ERROR |
Events of this type occur due to unexpected errors on the Administration Server side when working with the Google Firebase Cloud Messaging HTTP protocol. Read the details in the event description and respond accordingly. If you cannot find the solution to an issue on your own, we recommend that you contact Kaspersky Technical Support. |
90 days |
Little free space on the hard drive |
4105 |
KLSRV_NO_SPACE_ON_VOLUMES |
Events of this type occur when the hard drive of the device on which Administration Server is installed almost runs out of free space. Free up disk space on the device. |
90 days |
Little free space in the Administration Server database |
4106 |
KLSRV_NO_SPACE_IN_DATABASE |
Events of this type occur if space in the Administration Server database is too limited. If you do not remedy the situation, soon the Administration Server database will reach its capacity and Administration Server will not function. Following are the causes of this event, depending on the DBMS that you use, and the appropriate responses to the event. You use the SQL Server Express Edition DBMS:
Review the information on DBMS selection. |
90 days |
Connection to the secondary Administration Server has been interrupted |
4116 |
KLSRV_EV_SLAVE_SRV_DISCONNECTED |
Events of this type occur when a connection to the secondary Administration Server is interrupted. Read the Kaspersky Event Log on the device where the secondary Administration Server is installed and respond accordingly. |
90 days |
Connection to the primary Administration Server has been interrupted |
4118 |
KLSRV_EV_MASTER_SRV_DISCONNECTED |
Events of this type occur when a connection to the primary Administration Server is interrupted. Read the Kaspersky Event Log on the device where the primary Administration Server is installed and respond accordingly. |
90 days |
New updates for Kaspersky software modules have been registered |
4141 |
KLSRV_SEAMLESS_UPDATE_REGISTERED |
Events of this type occur when Administration Server registers new updates for the Kaspersky software installed on managed devices that require approval to be installed. Approve or decline the updates by using Administration Console or using Kaspersky Security Center Web Console. |
90 days |
Deletion of events from the database has started because the limit on the number of events was exceeded |
4145 |
KLSRV_EVP_DB_TRUNCATING |
Events of this type occur when deletion of old events from the Administration Server database has started after the Administration Server database capacity is reached. You can respond to the event in the following ways: |
Not stored |
Events have been deleted from the database because the limit on the number of events was exceeded |
4146 |
KLSRV_EVP_DB_TRUNCATED |
Events of this type occur when old events have been deleted from the Administration Server database after the Administration Server database capacity is reached. You can respond to the event in the following ways: |
Not stored |
Administration Server informational events
The table below shows the events of Kaspersky Security Center Administration Server that have the Info importance level.
Administration Server informational events
Event type display name |
Event type ID |
Event type |
Default storage term |
Remarks |
---|---|---|---|---|
Over 90% of the license key is used up |
4097 |
KLSRV_EV_LICENSE_CHECK_90 |
30 days |
|
New device has been detected |
4100 |
KLSRV_EVENT_HOSTS_NEW_DETECTED |
30 days |
|
Device has been automatically added to the group |
4101 |
KLSRV_EVENT_HOSTS_NEW_REDIRECTED |
30 days |
|
Device has been removed from the group: inactive on the network for a long time |
4104 |
KLSRV_INVISIBLE_HOSTS_REMOVED |
30 days |
|
Limit of installations will soon be exceeded (more than 95% is used up) for one of the licensed applications groups |
4128 |
KLSRV_INVLICPROD_EXPIRED_SOON |
30 days |
|
Files have been found to send to Kaspersky for analysis |
4131 |
KLSRV_APS_FILE_APPEARED |
30 days |
|
FCM Instance ID has changed on this mobile device |
4137 |
KLSRV_GCM_DEVICE_REGID_CHANGED |
30 days |
|
Updates have been successfully copied to the specified folder |
4122 |
KLSRV_UPD_REPL_OK |
30 days |
|
Connection to the secondary Administration Server has been established |
4115 |
KLSRV_EV_SLAVE_SRV_CONNECTED |
30 days |
|
Connection to the primary Administration Server has been established |
4117 |
KLSRV_EV_MASTER_SRV_CONNECTED |
30 days |
|
Databases have been updated |
4144 |
KLSRV_UPD_BASES_UPDATED |
30 days |
|
Audit: Connection to the Administration Server has been established |
4147 |
KLAUD_EV_SERVERCONNECT |
30 days |
|
Audit: Object has been modified |
4148 |
KLAUD_EV_OBJECTMODIFY |
30 days |
This event tracks changes in the following objects:
|
Audit: Object status has changed |
4150 |
KLAUD_EV_TASK_STATE_CHANGED |
30 days |
For example, this event occurs when a task has failed with an error. |
Audit: Group settings have been modified |
4149 |
KLAUD_EV_ADMGROUP_CHANGED |
30 days |
|
Audit: Connection to Administration Server has been terminated |
4151 |
KLAUD_EV_SERVERDISCONNECT |
30 days |
|
Audit: Object properties have been modified |
4152 |
KLAUD_EV_OBJECTPROPMODIFIED |
30 days |
This event tracks changes in the following properties:
|
Audit: User permissions have been modified |
4153 |
KLAUD_EV_OBJECTACLMODIFIED |
30 days |
|
Network Agent events
This section contains information about the events related to Network Agent.
Network Agent functional failure events
The table below shows the event types of Kaspersky Security Center Network Agent that have the Functional failure severity level.
Network Agent functional failure events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
Update installation error |
7702 |
KLNAG_EV_PATCH_INSTALL_ERROR |
Events of this type occur if automatic updating and patching for Kaspersky Security Center components was not successful. The event does not concern updates of the managed Kaspersky applications. Read the event description. A Windows issue on the Administration Server might be a reason for this event. If the description mentions any issue of Windows configuration, resolve this issue. |
30 days |
Failed to install the third-party software update |
7697 |
KLNAG_EV_3P_PATCH_INSTALL_ERROR |
Events of this type occur if Vulnerability and Patch Management and Mobile Device Management features are in use, and if update of third-party software was not successful. Check whether the link to the third-party software is valid. Read the event description. |
30 days |
Failed to install the Windows Update updates |
7717 |
KLNAG_EV_WUA_INSTALL_ERROR |
Events of this type occur if Windows Updates were not successful. Configure Windows Updates in a Network Agent policy. Read the event description. Look for the error in the Microsoft Knowledge Base. Contact Microsoft Technical Support if you cannot resolve the issue yourself. |
30 days |
Network Agent warning events
The table below shows the events of Kaspersky Security Center Network Agent that have the Warning severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Network Agent warning events
Event type display name |
Event type ID |
Event type |
Default storage term |
---|---|---|---|
Warning has been returned during installation of the software module update |
7701 |
KLNAG_EV_PATCH_INSTALL_WARNING |
30 days |
Third-party software update installation has completed with a warning |
7696 |
KLNAG_EV_3P_PATCH_INSTALL_WARNING |
30 days |
Third-party software update installation has been postponed |
7698 |
KLNAG_EV_3P_PATCH_INSTALL_SLIPPED |
30 days |
Incident has occurred |
549 |
GNRL_EV_APP_INCIDENT_OCCURED |
30 days |
KSN Proxy has started. Failed to check KSN for availability |
7718 |
KSNPROXY_STARTED_CON_CHK_FAILED |
30 days |
Network Agent informational events
The table below shows the events of Kaspersky Security Center Network Agent that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Network Agent informational events
Event type display name |
Event type ID |
Event type |
Default storage term |
---|---|---|---|
Update for software modules has been installed successfully |
7699 |
KLNAG_EV_PATCH_INSTALLED_SUCCESSFULLY |
30 days |
Installation of the software module update has started |
7700 |
KLNAG_EV_PATCH_INSTALL_STARTING |
30 days |
Application has been installed |
7703 |
KLNAG_EV_INV_APP_INSTALLED |
30 days |
Application has been uninstalled |
7704 |
KLNAG_EV_INV_APP_UNINSTALLED |
30 days |
Monitored application has been installed |
7705 |
KLNAG_EV_INV_OBS_APP_INSTALLED |
30 days |
Monitored application has been uninstalled |
7706 |
KLNAG_EV_INV_OBS_APP_UNINSTALLED |
30 days |
Third-party application has been installed |
7707 |
KLNAG_EV_INV_CMPTR_APP_INSTALLED |
30 days |
New device has been added |
7708 |
KLNAG_EV_DEVICE_ARRIVAL |
30 days |
Device has been removed |
7709 |
KLNAG_EV_DEVICE_REMOVE |
30 days |
New device has been detected |
7710 |
KLNAG_EV_NAC_DEVICE_DISCOVERED |
30 days |
Device has been authorized |
7711 |
KLNAG_EV_NAC_HOST_AUTHORIZED |
30 days |
Windows Desktop Sharing: File has been read |
7712 |
KLUSRLOG_EV_FILE_READ |
30 days |
Windows Desktop Sharing: File has been modified |
7713 |
KLUSRLOG_EV_FILE_MODIFIED |
30 days |
Windows Desktop Sharing: Application has been started |
7714 |
KLUSRLOG_EV_PROCESS_LAUNCHED |
30 days |
Windows Desktop Sharing: Started |
7715 |
KLUSRLOG_EV_WDS_BEGIN |
30 days |
Windows Desktop Sharing: Stopped |
7716 |
KLUSRLOG_EV_WDS_END |
30 days |
Third-party software update has been installed successfully |
7694 |
KLNAG_EV_3P_PATCH_INSTALLED_SUCCESSFULLY |
30 days |
Third-party software update installation has started |
7695 |
KLNAG_EV_3P_PATCH_INSTALL_STARTING |
30 days |
KSN Proxy has started. KSN availability check has completed successfully |
7719 |
KSNPROXY_STARTED_CON_CHK_OK |
30 days |
KSN Proxy has stopped |
7720 |
KSNPROXY_STOPPED |
30 days |
iOS MDM Server events
This section contains information about the events related to iOS MDM Server.
iOS MDM Server functional failure events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Functional failure severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to request the list of profile |
PROFILELIST_COMMAND_FAILED |
30 days |
Failed to install the profile |
INSTALLPROFILE_COMMAND_FAILED |
30 days |
Failed to remove the profile |
REMOVEPROFILE_COMMAND_FAILED |
30 days |
Failed to request the list of provisioning profiles |
PROVISIONINGPROFILELIST_COMMAND_FAILED |
30 days |
Failed to install provisioning profile |
INSTALLPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to remove the provisioning profile |
REMOVEPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to request the list of digital certificates |
CERTIFICATELIST_COMMAND_FAILED |
30 days |
Failed to request the list of installed applications |
INSTALLEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request general information about the mobile device |
DEVICEINFORMATION_COMMAND_FAILED |
30 days |
Failed to request security information |
SECURITYINFO_COMMAND_FAILED |
30 days |
Failed to lock the mobile device |
DEVICELOCK_COMMAND_FAILED |
30 days |
Failed to reset the password |
CLEARPASSCODE_COMMAND_FAILED |
30 days |
Failed to wipe data from the mobile device |
ERASEDEVICE_COMMAND_FAILED |
30 days |
Failed to install the app |
INSTALLAPPLICATION_COMMAND_FAILED |
30 days |
Failed to set the redemption code for the app |
APPLYREDEMPTIONCODE_COMMAND_FAILED |
30 days |
Failed to request the list of managed apps |
MANAGEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to remove the managed app |
REMOVEAPPLICATION_COMMAND_FAILED |
30 days |
Roaming settings have been rejected |
SETROAMINGSETTINGS_COMMAND_FAILED |
30 days |
Error has occurred in the app operation |
PRODUCT_FAILURE |
30 days |
Command result contains invalid data |
MALFORMED_COMMAND |
30 days |
Failed to send the push notification |
SEND_PUSH_NOTIFICATION_FAILED |
30 days |
Failed to send the command |
SEND_COMMAND_FAILED |
30 days |
Device not found |
DEVICE_NOT_FOUND |
30 days |
iOS MDM Server warning events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Warning severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server warning events
Event type display name |
Event type |
Default storage term |
---|---|---|
Attempt to connect a locked mobile device has been detected |
INACTICE_DEVICE_TRY_CONNECTED |
30 days |
Profile has been removed |
MDM_PROFILE_WAS_REMOVED |
30 days |
Attempt to re-use a client certificate has been detected |
CLIENT_CERT_ALREADY_IN_USE |
30 days |
Inactive device has been detected |
FOUND_INACTIVE_DEVICE |
30 days |
Redemption code is required |
NEED_REDEMPTION_CODE |
30 days |
Profile has been included in a policy removed from the device |
UMDM_PROFILE_WAS_REMOVED |
30 days |
iOS MDM Server informational events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server informational events
Event type display name |
Event type |
Default storage term |
---|---|---|
New mobile device has been connected |
NEW_DEVICE_CONNECTED |
30 days |
List of profiles has been successfully requested |
PROFILELIST_COMMAND_SUCCESSFULL |
30 days |
Profile has been successfully installed |
INSTALLPROFILE_COMMAND_SUCCESSFULL |
30 days |
Profile has been successfully removed |
REMOVEPROFILE_COMMAND_SUCCESSFULL |
30 days |
List of provisioning profiles has been successfully requested |
PROVISIONINGPROFILELIST_COMMAND_SUCCESSFULL |
30 days |
Provisioning profile has been successfully installed |
INSTALLPROVISIONINGPROFILE_COMMAND_SUCCESSFULL |
30 days |
Provisioning profile has been successfully removed |
REMOVEPROVISIONINGPROFILE_COMMAND_SUCCESSFULL |
30 days |
List of digital certificates has been successfully requested |
CERTIFICATELIST_COMMAND_SUCCESSFULL |
30 days |
List of installed applications has been successfully requested |
INSTALLEDAPPLICATIONLIST_COMMAND_SUCCESSFULL |
30 days |
General information about the mobile device has been successfully requested |
DEVICEINFORMATION_COMMAND_SUCCESSFULL |
30 days |
Security information has been successfully requested |
SECURITYINFO_COMMAND_SUCCESSFULL |
30 days |
Mobile device has been successfully locked |
DEVICELOCK_COMMAND_SUCCESSFULL |
30 days |
The password has been successfully reset |
CLEARPASSCODE_COMMAND_SUCCESSFULL |
30 days |
Data has been wiped from the mobile device |
ERASEDEVICE_COMMAND_SUCCESSFULL |
30 days |
App has been successfully installed |
INSTALLAPPLICATION_COMMAND_SUCCESSFULL |
30 days |
Redemption code has been successfully set for the app |
APPLYREDEMPTIONCODE_COMMAND_SUCCESSFULL |
30 days |
The list of managed apps has been successfully requested |
MANAGEDAPPLICATIONLIST_COMMAND_SUCCESSFULL |
30 days |
Managed app has been removed successfully |
REMOVEAPPLICATION_COMMAND_SUCCESSFULL |
30 days |
Roaming settings have been successfully applied |
SETROAMINGSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Exchange Mobile Device Server events
This section contains information about the events related to an Exchange Mobile Device Server.
Exchange Mobile Device Server functional failure events
The table below shows the events of Kaspersky Security Center Exchange Mobile Device Server that have the Functional failure severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Exchange Mobile Device Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to wipe data from the mobile device |
WIPE_FAILED |
30 days |
Cannot delete information about mobile device connection to mailbox |
DEVICE_REMOVE_FAILED |
30 days |
Failed to apply the ActiveSync policy to the mailbox |
POLICY_APPLY_FAILED |
30 days |
Application operation error |
PRODUCT_FAILURE |
30 days |
Failed to modify the state of ActiveSync functionality |
CHANGE_ACTIVE_SYNC_STATE_FAILED |
30 days |
Exchange Mobile Device Server informational events
The table below shows the events of Kaspersky Security Center Exchange Mobile Device Server that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Exchange Mobile Device Server informational events
Event type display name |
Event type |
Default storage term |
---|---|---|
New mobile device has connected |
NEW_DEVICE_CONNECTED |
30 days |
Data has been wiped from the mobile device |
WIPE_SUCCESSFULL |
30 days |
Blocking frequent events
This section provides information about managing frequent events blocking and about removing blocking of frequent events.
About blocking frequent events
A managed application, for example, Kaspersky Endpoint Security for Windows, installed on a single or several managed devices can send a lot of events of the same type to the Administration Server. Receiving frequent events may overload the Administration Server database and overwrite other events. Administration Server starts blocking the most frequent events when the number of all the received events exceeds the specified limit for the database.
Administration Server blocks the frequent events from receiving automatically. You cannot block the frequent events yourself, or choose which events to block.
If you want to find out if an event is blocked, you can view the notification list or you can check if this event is present in the Blocking frequent events section of the Administration Server properties. If the event is blocked, you can do the following:
- If you want to prevent overwriting the database, you can continue blocking such type of events from receiving.
- If you want, for example, to find the reason of sending the frequent events to the Administration Server, you can unblock frequent events and continue receiving the events of this type anyway.
- If you want to continue receiving the frequent events until they become blocked again, you can remove from blocking the frequent events.
Managing frequent events blocking
Administration Server blocks the automatic receiving of frequent events, but you can unblock and continue to receive frequent events. You can also block receiving frequent events that you unblocked before.
To manage frequent events blocking:
- In the main menu, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens.
- On the General tab, select the Blocking frequent events section.
- In the Blocking frequent events section:
- If you want to unblock the receiving of frequent events:
- Select the frequent events you want to unblock, and then click the Exclude button.
- Click the Save button.
- If you want to block receiving frequent events:
- Select the frequent events you want to block, and then click the Block button.
- Click the Save button.
- If you want to unblock the receiving of frequent events:
Administration Server receives the unblocked frequent events and does not receive the blocked frequent events.
Removing blocking of frequent events
You can remove blocking for frequent events and start receiving them until Administration Server blocks these frequent events again.
To remove blocking for frequent events:
- In the main menu, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens.
- On the General tab, select the Blocking frequent events section.
- In the Blocking frequent events section, select the frequent event types for which you want to remove blocking.
- Click the Remove from blocking button.
The frequent event is removed from the list of frequent events. Administration Server will receive events of this type.
Notifications and device statuses
This section contains information on how to view notifications, configure notification delivery, use device statuses, and enable changing device statuses.
Using notifications
Notifications alert you about events and help you to speed up your responses to these events by performing recommended actions or actions you consider as appropriate.
Depending on the notification method chosen, the following types of notifications are available:
- Onscreen notifications
- Notifications by SMS
- Notifications by email
- Notifications by executable file or script
Onscreen notifications
Onscreen notifications alert you to events grouped by importance levels (Critical, Warning, and Informational).
Onscreen notification can have one of two statuses:
- Reviewed. It means you have performed recommended action for the notification or you have assigned this status for the notification manually.
- Not Reviewed. It means you have not performed recommended action for the notification or you have not assigned this status for the notification manually.
By default, the list of notifications include notifications in the Not Reviewed status.
You can monitor your organization's network viewing onscreen notifications and responding to them in a real time.
Notifications by email, by SMS, and by executable file or a script
Kaspersky Security Center provides the capability to monitor your organization's network by sending notifications about any event that you consider important. For any event you can configure notifications by email, by SMS, or by running an executable file or a script.
Upon receiving notifications by email or by SMS, you can decide on your response to an event. This response should be the most appropriate for your organization's network. By running an executable file or a script, you predefine a response to an event. You can also consider running an executable file or a script as a primary response to an event. After the executable file runs, you can take other steps to respond to the event.
Page topViewing onscreen notifications
You can view notifications onscreen in three ways:
- In the MONITORING & REPORTING → NOTIFICATIONS section. Here you can view notifications relating to predefined categories.
- In a separate window that can be opened no matter which section you are using at the moment. In this case you can mark notifications as reviewed.
- In the Notifications by selected severity level widget on the MONITORING & REPORTING → DASHBOARD section. In the widget, you can view only notifications of events that are at the Critical and Warning importance levels.
You can perform actions, for example, you can response to an event.
To view notifications from predefined categories:
- In the main menu, go to MONITORING & REPORTING → NOTIFICATIONS.
The All notifications category is selected in the left pane, and in the right pane all the notifications are displayed.
- In the left pane, select one of the categories:
- Deployment
- Devices
- Protection
- Updates (this includes notifications about Kaspersky applications available for download and notifications about anti-virus database updates that have been downloaded)
- Exploit Prevention
- Administration Server (this includes events concerning only Administration Server)
- Useful links (this includes links to Kaspersky resources, for example, Kaspersky Technical Support, Kaspersky forum, license renewal page, or the Kaspersky IT Encyclopedia)
- Kaspersky news (this includes information about releases of Kaspersky applications)
A list of notifications of the selected category is displayed. The list contains the following:
- Icon related to the topic of the notification: deployment (
), protection (
), updates (
), device management (
), Exploit Prevention (
), Administration Server (
).
- Notification importance level. Notifications of the following importance levels are displayed: Critical notifications (
), Warning notifications (
), Info notifications. Notifications in the list are grouped by importance levels.
- Notification. This contains a description of the notification.
- Action. This contains a link to a quick action that we recommend you perform. For example, by clicking this link, you can proceed to the repository and install security applications on devices, or view a list of devices or a list of events. After you perform the recommended action for the notification, this notification is assigned the Reviewed status.
- Status registered. This contains the number of days or hours that have passed from the moment when the notification was registered on the Administration Server.
To view onscreen notifications in a separate window by importance level:
- In the upper-right corner of Kaspersky Security Center 13.1 Web Console, click the flag icon (
).
If the flag icon has a red dot, there are notifications that have not been reviewed.
A window opens listing the notifications. By default, the All notifications tab is selected and the notifications are grouped by importance level: Critical, Warning, and Info.
- Select the System tab.
The list of Critical (
) and Warning (
) importance levels notifications is displayed. The notification list includes the following:
- Color marker. Critical notifications are marked in red. Warning notifications are marked in yellow.
- Icon indicating the topic of the notification: deployment (
), protection (
), updates (
), device management (
), Exploit Prevention (
), Administration Server (
).
- Description of the notification.
- Flag icon. The flag icon is gray if notifications have been assigned the Not Reviewed status. When you select the gray flag icon and assign the Reviewed status to a notification, the icon changes color to white.
- Link to the recommended action. When you perform the recommended action after clicking the link, the notification gets the Reviewed status.
- Number of days that have passed since the date when the notification was registered on the Administration Server.
- Select the More tab.
The list of Info importance level notifications is displayed.
The organization of the list is the same as for the list on the System tab (see the description above). The only difference is the absence of a color marker.
You can filter notifications by the date interval when they were registered on Administration Server. Use the Show filter check box to manage the filter.
To view onscreen notifications in the widget:
- In the DASHBOARD section, select Add or restore web widget.
- In the window that opens, click the Other category, select the Notifications by selected severity level widget, and click Add.
The widget now appears on the DASHBOARD tab. By default, the notifications of Critical importance level are displayed on the widget.
You can click the Settings button on the widget and change the widget settings to view notifications of the Warning importance level. Or, you can add another widget: Notifications by selected severity level, with a Warning importance level.
The list of notifications on the widget is limited by its size and includes two notifications. These two notifications relate to the latest events.
The notification list in the widget includes the following:
- Icon related to the topic of the notification: deployment (
), protection (
), updates (
), device management (
), Exploit Prevention (
), Administration Server (
).
- Description of the notification with a link to the recommended action. When you perform a recommended action after clicking the link, the notification gets the Reviewed status.
- Number of days or number of hours that have passed since the date when the notification was registered on the Administration Server.
- Link to other notifications. Upon clicking this link, you are transferred to the view of notifications in the NOTIFICATIONS section of the MONITORING & REPORTING section.
About device statuses
Kaspersky Security Center assigns a status to each managed device. The particular status depends on whether the conditions defined by the user are met. In some cases, when assigning a status to a device, Kaspersky Security Center takes into consideration the device's visibility flag on the network (see the table below). If Kaspersky Security Center does not find a device on the network within two hours, the visibility flag of the device is set to Not Visible.
The statuses are the following:
- Critical or Critical / Visible
- Warning or Warning / Visible
- OK or OK / Visible
The table below lists the default conditions that must be met to assign the Critical or Warning status to a device, with all possible values.
Conditions for assigning a status to a device
Condition |
Condition description |
Available values |
---|---|---|
Security application is not installed |
Network Agent is installed on the device, but a security application is not installed. |
|
Too many viruses detected |
Some viruses have been found on the device by a task for virus detection, for example, the Virus scan task, and the number of viruses found exceeds the specified value. |
More than 0. |
Real-time protection level differs from the level set by the Administrator |
The device is visible on the network, but the real-time protection level differs from the level set (in the condition) by the administrator for the device status. |
|
Virus scan has not been performed in a long time |
The device is visible on the network and a security application is installed on the device, but neither the Malware scan task nor a local scan task has been run within the specified time interval. The condition is applicable only to devices that were added to the Administration Server database 7 days ago or earlier. |
More than 1 day. |
Databases are outdated |
The device is visible on the network and a security application is installed on the device, but the anti-virus databases have not been updated on this device within the specified time interval. The condition is applicable only to devices that were added to the Administration Server database 1 day ago or earlier. |
More than 1 day. |
Not connected in a long time |
Network Agent is installed on the device, but the device has not connected to an Administration Server within the specified time interval, because the device was turned off. |
More than 1 day. |
Active threats are detected |
The number of unprocessed objects in the ACTIVE THREATS folder exceeds the specified value. |
More than 0 items. |
Restart is required |
The device is visible on the network, but an application requires the device restart longer than the specified time interval and for one of the selected reasons. |
More than 0 minutes. |
Incompatible applications are installed |
The device is visible on the network, but software inventory performed through Network Agent has detected incompatible applications installed on the device. |
|
Software vulnerabilities have been detected |
The device is visible on the network and Network Agent is installed on the device, but the Find vulnerabilities and required updates task has detected vulnerabilities with the specified severity level in applications installed on the device. |
|
License expired |
The device is visible on the network, but the license has expired. |
|
License expires soon |
The device is visible on the network, but the license will expire on the device in less than the specified number of days. |
More than 0 days. |
Check for Windows Update updates has not been performed in a long time |
The device is visible on the network, but the Perform Windows Update synchronization task has not been run within the specified time interval. |
More than 1 day. |
Invalid encryption status |
Network Agent is installed on the device, but the device encryption result is equal to the specified value. |
|
Mobile device settings do not comply with the policy |
The mobile device settings are other than the settings that were specified in the Kaspersky Endpoint Security for Android policy during the check of compliance rules. |
|
Unprocessed incidents detected |
Some unprocessed incidents have been found on the device. Incidents can be created either automatically, through managed Kaspersky applications installed on the client device, or manually by the administrator. |
|
Device status defined by application |
The status of the device is defined by the managed application. |
|
Device is out of disk space |
Free disk space on the device is less than the specified value or the device could not be synchronized with the Administration Server. The Critical or Warning status is changed to the OK status when the device is successfully synchronized with the Administration Server and free space on the device is greater than or equal to the specified value. |
More than 0 MB. |
Device has become unmanaged |
During device discovery, the device was recognized as visible on the network, but more than three attempts to synchronize with the Administration Server failed. |
|
Protection is disabled |
The device is visible on the network, but the security application on the device has been disabled for longer than the specified time interval. |
More than 0 minutes. |
Security application is not running |
The device is visible on the network and a security application is installed on the device but is not running. |
|
Kaspersky Security Center allows you to set up automatic switching of the status of a device in an administration group when specified conditions are met. When specified conditions are met, the client device is assigned one of the following statuses: Critical or Warning. When specified conditions are not met, the client device is assigned the OK status.
Different statuses may correspond to different values of one condition. For example, by default, if the Databases are outdated condition has the More than 3 days value, the client device is assigned the Warning status; if the value is More than 7 days, the Critical status is assigned.
If you upgrade the Kaspersky Security Center from the previous version, the values of the Databases are outdated condition for assigning the status to Critical or Warning do not change.
When Kaspersky Security Center assigns a status to a device, for some conditions (see the Condition description column) the visibility flag is taken into consideration. For example, if a managed device was assigned the Critical status because the Databases are outdated condition was met, and later the visibility flag was set for the device, then the device is assigned the OK status.
Configuring the switching of device statuses
You can change conditions to assign the Critical or Warning status to a device.
To enable changing the device status to Critical:
- In the main menu, go to DEVICES → HIERARCHY OF GROUPS.
- In the list of groups that opens, click the link with the name of a group for which you want to change switching the device statuses.
- In the properties window that opens, select the Device status tab.
- In the left pane, select Critical.
- In the right pane, in the Set to Critical if these are specified section, enable the condition to switch a device to the Critical status.
You can change only settings that are not locked in the parent policy.
- Select the radio button next to the condition in the list.
- In the upper-left corner of the list, click the Edit button.
- Set the required value for the selected condition.
Values cannot be set for every condition.
- Click OK.
When specified conditions are met, the managed device is assigned the Critical status.
To enable changing the device status to Warning:
- In the main menu, go to DEVICES → HIERARCHY OF GROUPS.
- In the list of groups that opens, click the link with the name of a group for which you want to change switching the device statuses.
- In the properties window that opens, select the Device status tab.
- In the left pane, select Warning.
- In the right pane, in the Set to Warning if these are specified section, enable the condition to switch a device to the Warning status.
You can change only settings that are not locked in the parent policy.
- Select the radio button next to the condition in the list.
- In the upper-left corner of the list, click the Edit button.
- Set the required value for the selected condition.
Values cannot be set for every condition.
- Click OK.
When specified conditions are met, the managed device is assigned the Warning status.
Configuring notification delivery
You can configure notification about events occurring in Kaspersky Security Center. Depending on the notification method chosen, the following types of notifications are available:
- Email—When an event occurs, Kaspersky Security Center sends a notification to the email addresses specified.
- SMS—When an event occurs, Kaspersky Security Center sends a notification to the phone numbers specified.
- Executable file—When an event occurs, the executable file is run on the Administration Server.
To configure notification delivery of events occurring in Kaspersky Security Center:
- At the top of the screen, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens with the General tab is selected.
- Click the Notification section, and in the right pane select the tab for the notification method you want:
- On the tab, define the notification settings.
- Click the OK button to close the Administration Server properties window.
The saved notification delivery settings are applied to all events that occur in Kaspersky Security Center.
You can override notification delivery settings for certain events in the Event configuration section of the Administration Server settings, of a policy's settings, or of an application's settings.
Event notifications displayed by running an executable file
Kaspersky Security Center can notify the administrator about events on client devices by running an executable file. The executable file must contain another executable file with placeholders of the event to be relayed to the administrator.
Placeholders for describing an event
Placeholder |
Placeholder description |
---|---|
%SEVERITY% |
Event importance level |
%COMPUTER% |
Name of the device where the event occurred |
%DOMAIN% |
Domain |
%EVENT% |
Event |
%DESCR% |
Event description |
%RISE_TIME% |
Time created |
%KLCSAK_EVENT_TASK_DISPLAY_NAME% |
Task name |
%KL_PRODUCT% |
Kaspersky Security Center Network Agent |
%KL_VERSION% |
Network Agent version number |
%HOST_IP% |
IP address |
%HOST_CONN_IP% |
Connection IP address |
Example: Event notifications are sent by an executable file (such as script1.bat) inside which another executable file (such as script2.bat) with the %COMPUTER% placeholder is launched. When an event occurs, the script1.bat file is run on the administrator's device, which, in turn, runs the script2.bat file with the %COMPUTER% placeholder. The administrator then receives the name of the device where the event occurred. |
Kaspersky announcements
This section describes how to use, configure, and disable Kaspersky announcements.
About Kaspersky announcements
The Kaspersky announcements section (MONITORING & REPORTING → Kaspersky announcements) keeps you informed by providing information related to your version of Kaspersky Security Center and the managed applications installed on the managed devices. Kaspersky Security Center periodically updates the information in the section by removing outdated announcements and adding new information.
Administration Server must have an internet connection to receive Kaspersky announcements.
The announcements include information of the following types:
- Security-related announcements
Security-related announcements are intended to keep the Kaspersky applications installed in your network up-to-date and fully functional. The announcements may include information about critical updates for Kaspersky applications, fixes for found vulnerabilities, and ways to fix other issues in Kaspersky applications. Security-related announcements are enabled by default. If you do not want to receive the announcements, you can disable this feature.
To show you the information that corresponds to your network protection configuration, Kaspersky Security Center sends data to Kaspersky cloud servers and receives only those announcements that relate to the Kaspersky applications installed in your network. The data set that can be sent to the servers is described in the End User License Agreement that you accept when you install Kaspersky Security Center Administration Server.
- Marketing announcements
Marketing announcements include information about special offers for your Kaspersky applications, advertisements, and news from Kaspersky. Marketing announcements are disabled by default. You receive this type of announcements only if you enabled Kaspersky Security Network (KSN). You can disable marketing announcements by disabling KSN.
To show you only relevant information that might be helpful in protecting your network devices and in your everyday tasks, Kaspersky Security Center sends data to Kaspersky cloud servers and receives the appropriate announcements. The data set that can be sent to the servers is described in the Processed Data section of the KSN Statement.
New information is divided into the following categories, according to importance:
- Critical info
- Important news
- Warning
- Info
When new information appears in the Kaspersky announcements section, Kaspersky Security Center 13.1 Web Console displays a notification label that corresponds to the importance level of the announcements. You can click the label to view this announcement in the Kaspersky announcements section.
You can specify the Kaspersky announcements settings, including the announcement categories that you want to view and where to display the notification label.
Specifying Kaspersky announcements settings
In the Kaspersky announcements section, you can specify the Kaspersky announcements settings, including the categories of the announcements that you want to view and where to display the notification label.
To configure Kaspersky announcements:
- In the main menu, go to MONITORING & REPORTING → KASPERSKY ANNOUNCEMENTS.
- Click the Settings link.
The Kaspersky announcement settings window opens.
- Specify the following settings:
- Select the importance level of the announcements that you want to view. The announcements of other categories will not be displayed.
- Select where you want to see the notification label. The label can be displayed in all console sections, or in the MONITORING & REPORTING section and its subsections.
- Click the OK button.
The Kaspersky announcement settings are specified.
Disabling Kaspersky announcements
The Kaspersky announcements section (MONITORING & REPORTING → Kaspersky announcements) keeps you informed by providing information related to your version of Kaspersky Security Center and managed applications installed on the managed devices. If you do not want to receive Kaspersky announcements, you can disable this feature.
The Kaspersky announcements include two types of information: security-related announcements and marketing announcements. You can disable the announcements of each type separately.
To disable security-related announcements:
- In the main menu, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens.
- On the General tab, select the Kaspersky announcements section.
- Switch the toggle button to the Security-related announcements DISABLED position.
- Click the Save button.
Kaspersky announcements are disabled.
Marketing announcements are disabled by default. You receive marketing announcements only if you enabled Kaspersky Security Network (KSN). You can disable this type of announcement by disabling KSN.
To disable marketing announcements:
- In the main menu, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens.
- On the General tab, select the KSN Proxy settings section.
- Disable the Use Kaspersky Security Network ENABLED option.
- Click the Save button.
Marketing announcements are disabled.
Viewing information about the detects of threats
You can enable or disable displaying information about alerts.
To enable or disable displaying the ALERTS section in the main menu:
- In the main menu, go to your account settings and select Interface options.
- In the Interface options window that opens, enable or disable the Show EDR alerts option.
- Click Save.
The console displays the ALERTS subsection in the MONITORING & REPORTING section of the main menu. In the ALERTS subsection, you can view information about the detects of threats on the endpoint devices. If you add a license key for EDR Optimum, then Kaspersky Security Center 13.1 Web Console automatically displays ALERTS subsection in the MONITORING & REPORTING section of the main menu. Also, you can add a widget that displays information about alerts. Also, if you installed the plug-in EDR Optimum, you can view detailed information about detected threats by clicking more details link.