Contents
- Monitoring and reporting
- Scenario: Monitoring and reporting
- Monitoring traffic lights and logged events in Administration Console
- Working with reports, statistics, and notifications
- Working with reports
- Managing statistics
- Configuring event notification
- Creating a certificate for an SMTP server
- Event selections
- Device selections
- Monitoring of applications installation and uninstallation
- Event types
- Blocking frequent events
- Controlling changes in the status of virtual machines
- Monitoring the anti-virus protection status using information from the system registry
- Viewing and configuring the actions when devices show inactivity
- Disabling Kaspersky announcements
Monitoring and reporting
This section describes the monitoring and reporting capabilities of Kaspersky Security Center. These capabilities give you an overview of your infrastructure, protection statuses, and statistics.
After Kaspersky Security Center deployment or during the operation, you can configure the monitoring and reporting features to best suit your needs.
- Traffic lights
Administration Console allows you to quickly assess the current status of Kaspersky Security Center and managed devices by checking traffic lights.
- Statistics
Statistics on the status of the protection system and managed devices are displayed in information panels that can be customized.
- Reports
The Reports feature allows you to get detailed numerical information about the security of your organization's network, save this information to a file, send it by email, and print it.
- Events
Event selections provide an onscreen view of named sets of events that are selected from the Administration Server database. These sets of events are grouped according to the following categories:
- By importance level—Critical events, Functional failures, Warnings, and Info events
- By time—Recent events
- By type—User requests and Audit events
You can create and view user-defined event selections based on the settings available, in the Kaspersky Security Center 13.1 Web Console interface, for configuration.
Scenario: Monitoring and reporting
This section provides a scenario for configuring the monitoring and reporting feature in Kaspersky Security Center.
Prerequisites
After you deploy Kaspersky Security Center in an organization's network you can start to monitor it and generate reports on its functioning.
Stages
Monitoring and reporting in an organization's network proceeds in stages:
- Configuring the switching of device statuses
Get acquainted with the settings that define the assignment of device statuses depending on specific conditions. By changing these settings, you can change the number of events with Critical or Warning importance levels.
When configuring the switching of device statuses, be sure that the new settings do not conflict with the information security policies of your organization and that you are able to react to important security events in your organization's network in a timely manner.
- Configuring notifications about events on client devices
Configure notification (by email, by SMS, or by running an executable file) of events on client devices in accordance with your organization's needs.
- Changing the response of your security network to the Virus outbreak event
To adjust the network's response to new events, you can change the specific thresholds in the Administration Server properties. You can also create a stricter policy that will be activated, or create a task that will be run at the occurrence of this event.
- Managing statistics
Configure the display of statistics in accordance with your organization's needs.
- Reviewing the security status of your organization's network
To review the security status of your organization's network, you can do any of the following:
- In the workspace of the Administration Server node, on the Statistics tab open the Protection status second-level tab (page) and review the Real-time protection status information panel
- Generate and review the Report on protection status
- Generate and review the Report on errors
- Locating client devices that are not protected
To locate client devices that are not protected, go the workspace of the Administration Server node, on the Statistics tab open the Protection status second-level tab (page), and review the History of discovery of new networked devices information panel. You can also generate and review the Report on protection deployment.
- Checking protection of client devices
To check protection of client devices, go to the workspace of the Administration Server node, on the Statistics tab open the Deployment or Threat statistics second-level tab (page), and review the relevant information panels. You can also start and review the Critical events event selection.
- Evaluating and limiting the event load on the database
Information about events that occur during operation of managed applications is transferred from a client device and registered in the Administration Server database. To reduce the load on the Administration Server, evaluate and limit the maximum number of events that can be stored in the database.
To evaluate the event load on the database, calculate the database space. You can also limit the maximum number of events to avoid database overflow.
- Reviewing license information
To review license information, go to the workspace of the Administration Server node, on the Statistics tab open the Deployment second-level tab (page), and review the License key usage information panel. You can also generate and review the Report on usage of license keys.
Results
Upon completion of the scenario, you are informed about protection of your organization's network and, thus, can plan actions for further protection.
Page topMonitoring traffic lights and logged events in Administration Console
Administration Console allows you to quickly assess the current status of Kaspersky Security Center and managed devices by checking traffic lights. The traffic lights are shown in the workspace of the Administration Server node, on the Monitoring tab. The tab provides six information panels with traffic lights and logged events. A traffic light is a colored vertical bar on the left side of a panel. Each panel with a traffic light corresponds to a specific functional scope of Kaspersky Security Center (see the table below).
Scopes covered by traffic lights in Administration Console
Panel name |
Traffic light scope |
---|---|
Deployment |
Installing Network Agent and security applications on devices on an organization's network |
Management scheme |
Structure of administration groups. Network scanning. Device moving rules |
Protection settings |
Security application functionality: protection status, virus scanning |
Update |
Updates and patches |
Monitoring |
Protection status |
Administration Server |
Administration Server features and properties |
Each traffic light can be any of these five colors (see the table below). The color of a traffic light depends on the current status of Kaspersky Security Center and on events that were logged.
Color codes of traffic lights
Status |
Traffic light color |
Traffic light color meaning |
---|---|---|
Informational |
Green |
Administrator's intervention is not required. |
Warning |
Yellow |
Administrator's intervention is required. |
Critical |
Red |
Serious problems have been encountered. Administrator's intervention is required to solve them. |
Informational |
Light blue |
Events have been logged that are unrelated to potential or actual threats to the security of managed devices. |
Informational |
Gray |
The details of events are not available or have not yet been retrieved. |
The administrator's goal is to keep traffic lights on all of the information panels on the Monitoring tab green.
The information panels also show logged events that affect traffic lights and the status of Kaspersky Security Center (see the table below).
Name, description, and traffic light colors of logged events
Traffic light color |
Event type display name |
Event type |
Description |
---|---|---|---|
Red |
License expired on %1 device(s) |
IDS_AK_STATUS_LIC_EXPAIRED |
Events of this type occur when the commercial license has expired. Once a day Kaspersky Security Center checks whether the license has expired on the devices. When the commercial license expires, Kaspersky Security Center provides only basic functionality. To continue using Kaspersky Security Center, renew your commercial license. |
Red |
Security application is not running on: %1 device(s) |
IDS_AK_STATUS_AV_NOT_RUNNING |
Events of this type occur when the security application installed on the device is not running. Make sure that Kaspersky Endpoint Security is running on the device. |
Red |
Protection is disabled on: %1 device(s) |
IDS_AK_STATUS_RTP_NOT_RUNNING |
Events of this type occur when the security application on the device has been disabled for longer than the specified time interval. Check the current status of real-time protection on the device and make sure that all the protection components that you need are enabled. |
Red |
A software vulnerability has been detected on devices |
IDS_AK_STATUS_VULNERABILITIES_FOUND |
Events of this type occur when the Find vulnerabilities and required updates task has detected vulnerabilities with the severity level specified in applications installed on the device. Check the list of available updates in the Software updates subfolder included in the Application management folder. This folder contains a list of updates for Microsoft applications and other software vendors products retrieved by Administration Server, which can be distributed to devices. After viewing information about available updates, install them on the device. |
Red |
Critical events have been registered on the Administration Server |
IDS_AK_STATUS_EVENTS_OCCURED |
Events of this type occur when Administration Server critical events are detected. Check the list of events stored on the Administration Server, and then fix the critical events one by one. |
Red |
Errors have been logged in events on the Administration Server |
IDS_AK_STATUS_ERROR_EVENTS_OCCURED |
Events of this type occur when unexpected errors are logged on the Administration Server side. Check the list of events stored on the Administration Server, and then fix the errors one by one. |
Red |
Lost connection to %1 device(s) |
IDS_AK_STATUS_ADM_LOST_CONTROL1 |
Events of this type occur when the connection between the Administration Server and the device is lost. View the list of disconnected devices and try to reconnect them. |
Red |
%1 device (s) have not connected to the Administration Server in a long time |
IDS_AK_STATUS_ADM_NOT_CONNECTED1 |
Events of this type occur when the device has not connected to the Administration Server within the specified time interval, because the device was turned off. Make sure that the device is turned on and that Network Agent is running. |
Red |
%1 device(s) have a status other than OK |
IDS_AK_STATUS_HOST_NOT_OK |
Events of this type occur when the OK status of the device connected to the Administration Server changes to Critical or Warning. You can troubleshoot the problem by using the Kaspersky Security Center remote diagnostics utility. |
Red |
Databases are outdated on: %1 device(s) |
IDS_AK_STATUS_UPD_HOSTS_NOT_UPDATED |
Events of this type occur when the anti-virus databases have not been updated on the device within the specified time interval. Follow the instructions to update Kaspersky databases. |
Red |
Device(s) where check for Windows Update updates has not been performed in a long time: %1 |
IDS_AK_STATUS_WUA_DATA_OBSOLETE |
Events of this type occur when the Perform Windows Update synchronization task has not been run within the specified time interval. Follow the instructions to synchronize updates from Windows Update with Administration Server. |
Red |
%n plug-in(s) for Kaspersky Security Center 13.1 must be installed |
IDS_AK_STATUS_PLUGINS_REQUIRED |
Events of this type occur when you need to install additional plug-ins for Kaspersky applications. Download and install the required management plug-ins for the Kaspersky application from the Kaspersky Technical Support webpage. |
Working with reports, statistics, and notifications
This section provides information about how to work with reports, statistics, and selections of events and devices in Kaspersky Security Center, as well as how to configure Administration Server notifications.
Working with reports
Reports in Kaspersky Security Center contain information about the status of managed devices. Reports are generated based on information stored on Administration Server. You can create reports for the following types of objects:
- For device selections created according to specific settings.
- For administration groups.
- For specific devices from different administration groups.
- For all devices on the network (in the deployment report).
The application has a selection of standard report templates. It is also possible to create custom report templates. Reports are displayed in the main application window, in the Administration Server folder in the console tree.
Creating a report template
To create a report template:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- Click the New report template button.
The New Report Template Wizard starts. Follow the instructions of the Wizard.
After the Wizard finishes its operation, the newly created report template is added to the selected Administration Server folder in the console tree. You can use this template for generating and viewing reports.
Page topViewing and editing report template properties
You can view and edit basic properties of a report template, for example, the report template name or the fields displayed in the report.
To view and edit properties of a report template:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, select the required report template.
- In the context menu of the selected report template, select Properties.
As an alternative, you can first generate the report, and then click either the Open report template properties button or the Configure report columns button.
- In the window that opens, edit the report template properties. Properties of each report may contain only some of the sections described below.
- General section:
- Report template name
- Maximum number of entries to display
- Print version
- Fields section.
Select the fields that will be displayed in the report, and the order of these fields, and configure whether the information in the report must be sorted and filtered by each of the fields.
- Time interval section.
Modify the report period. Available values are as follows:
- Between the two specified dates
- From the specified date to the report creation date
- From the report creation date, minus the specified number of days, to the report creation date
- Group, Device selection, or Devices section.
Change the set of client devices for which the report creates. Only one of these sections may be present, depending on the settings specified during the report template creation.
- Settings section.
Change the settings of the report. The exact set of settings depends on the specific report.
- Security section. Inherit settings from Administration Server
The Security section is available if the Display security settings sections check box is selected in the interface settings window.
- Hierarchy of Administration Servers section:
- General section:
Extended filter format in report templates
In Kaspersky Security Center 13.1, you can apply the extended filter format to a report template. The extended filter format provides more flexibility in comparison with the default format. You can create complex filtering conditions by using a set of filters, which will be applied to the report by means of the OR logical operator during report creation, as shown below:
Filter[1](Field[1] AND Field[2]... AND Field[n]) OR Filter[2](Field[1] AND Field[2]... AND Field[n]) OR... Filter[n](Field[1] AND Field[2]... AND Field[n])
Additionally, with the extended filter format you can set a time interval value in a relative time format (for example, by using a "For last N days" condition) for specific fields in a filter. The availability and the set of time interval conditions depend on the type of the report template.
Converting the filter into the extended format
The extended filter format for report templates is supported only in Kaspersky Security Center 12 and later versions. After conversion of the default filter into the extended format, the report template becomes incompatible with Administration Servers on your network that have earlier versions of Kaspersky Security Center installed. Information from these Administration Servers will not be received for the report.
To convert the report template default filter into the extended format:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, select the required report template.
- In the context menu of the selected report template, select Properties.
- In the properties window that opens, select the Fields section.
- In the Details fields tab click the Convert filter link.
- In the window that opens, click the OK button.
Conversion into the extended filter format is irreversible for the report template to which it is applied. If you clicked the Convert filter link accidentally, you can cancel the changes by clicking the Cancel button in the report template properties window.
- To apply the changes, close the report template properties window by clicking the OK button.
When the report template properties window opens again, the newly available Filters section is displayed. In this section you can configure the extended filter.
Configuring the extended filter
To configure the extended filter in the report template properties:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, select the report template that was previously converted to extended filter format.
- In the context menu of the selected report template, select Properties.
- In the properties window that opens, select the Filters section.
The Filters section is not displayed if the report template was not previously converted to extended filter format.
In the Filters section of the report template properties window you can review and modify the list of filters applied to the report. Each filter in the list has a unique name and represents a set of filters for corresponding fields in the report.
- Open the filter settings window in one of the following ways:
- To create a new filter, click the Add button.
- To modify the existing filter, select the required filter and click the Modify button.
- In the window that opens, select and specify the values of the required fields of the filter.
- Click the OK button to save changes and close the window.
If you are creating a new filter, the filter name must be specified in the Filter name field before clicking the OK button.
- Close the report template properties window by clicking the OK button.
The extended filter in the report template is configured. Now you can create reports by using this report template.
Creating and viewing a report
To create and view a report:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, double-click the report template that you need.
A report for the selected template is displayed.
The report displays the following data:
- The name and type of report, a brief description and the reporting period, as well as information about the group of devices for which the report is generated.
- Graph chart showing the most representative report data.
- Consolidated table with calculated report indicators.
- Table with detailed report data.
Saving a report
To save a created report:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, select the report template that you need.
- In the context menu of the selected report template, select Save.
The Report Saving Wizard starts. Follow the instructions of the Wizard.
After the Wizard finishes, the folder opens to which you have saved the report file.
Page topCreating a report delivery task
Reports can be emailed. Delivery of reports in Kaspersky Security Center is carried out using the report delivery task.
To create a delivery task for a single report:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Reports tab.
- In the list of report templates, select the report template that you need.
- In the context menu of the selected report template, select Deliver reports.
The Report Delivery Task Creation Wizard starts. Follow the instructions of the Wizard.
To create a delivery task for multiple reports:
- In the console tree, under the node with the name of the required Administration Server, select the Tasks folder.
- In the workspace of the Tasks folder, click the Create a task button.
The Add Task Wizard starts. Follow the instructions of the Wizard.
The newly created report delivery task is displayed in the Tasks folder in the console tree.
The report delivery task is created automatically if the email settings were specified during Kaspersky Security Center installation.
Step 1. Selecting the task type
In the Select the task type window, in the list of tasks select Deliver reports as the task type.
Click Next to proceed to the next step.
Page topStep 2. Selecting the report type
In the Select report type window, in the list of task creation templates, select the type of report.
Click Next to proceed to the next step.
Page topStep 3. Actions on a report
In the Action to apply to reports window, specify the following settings:
- Send reports by email
- Save reports to shared folder
- Overwrite older reports of the same type
- Specify account for access to shared folder
Click Next to proceed to the next step.
Page topStep 4. Selecting the account to start the task
In the Selecting an account to run the task window, you can specify which account to use when running the task. Select one of the following options:
Click Next to proceed to the next step.
Page topStep 5. Configuring a task schedule
On the Configure task schedule Wizard page, you can create a schedule for task start. If necessary, define the following settings:
- Scheduled start:
- Run missed tasks
- Use automatically randomized delay for task starts
- Use randomized delay for task starts within an interval of (min)
Step 6. Defining the task name
In the Define the task name window, specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|
).
Click Next to proceed to the next step.
Page topStep 7. Completing creation of the task
In the Finish task creation window, click the Finish button to finish the wizard.
If you want the task to start as soon as the wizard finishes, select the Run the task after the Wizard finishes check box.
Page topManaging statistics
Statistics on the status of the protection system and managed devices are displayed in information panels that can be customized. Statistics are displayed in the workspace of the Administration Server node on the Statistics tab. The tab contains some second-level tabs (pages). Each tabbed page displays information panels with statistics, as well as links to corporate news and other materials from Kaspersky. The statistical information is displayed in information panels as a table or chart (pie or bar). The data in the information panels is updated while the application is running and reflects the current state of the protection application.
You can modify the set of second-level tabs on the Statistics tab, the number of information panels on each tabbed page, and the data display mode in information panels.
To add a new second-level tab with information panels on the Statistics tab:
- Click the Customize view button in the upper right corner of the Statistics tab.
The statistics properties window opens. This window contains a list of tabbed pages that are currently shown on the Statistics tab. In this window, you can change the display order for the pages on the tab, add and remove pages, and proceed to configuration of page properties by clicking the Properties button.
- Click the Add button.
This opens the properties window of a new page.
- Configure the new page:
- In the General section, specify the page name.
- In the Information panels section, click the Add button to add information panels that must be displayed on the page.
Click the Properties button in the Information panels section to set up the properties of information panels that you added: name, type, and appearance of the chart in the panel, as well as data required to plot the chart.
- Click OK.
The tabbed page with information panels that you have added appears on the Statistics tab. Click the settings icon () to proceed instantly to configuration of the page or a selected information panel on that page.
Configuring event notification
Kaspersky Security Center allows you to select a method of notifying the administrator of events on client devices and to configure notification:
- Email. When an event occurs, the application sends a notification to email addresses specified. You can edit the text of the notification.
- SMS. When an event occurs, the application sends a notification to the phone numbers specified. You can configure SMS notifications to be sent through the mail gateway.
- Executable file. When an event occurs on a device, the executable file is started on the administrator's workstation. Using the executable file, the administrator can receive the parameters of any event that has occurred.
To configure notification of events occurring on client devices:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- Click the Configure notifications and event export link and select the Configure notifications value in the drop-down list.
This opens the Properties: Events window.
- In the Notification section, select a notification method (by email, by SMS, or by running an executable file) and define the notification settings:
- In the Notification message field, enter the text that the application will send when an event occurs.
You can use the drop-down list to the right of the text field to add substitution settings with event details (for example, event description, or time of occurrence).
If the notification text contains a percent (%), you must specify it twice in succession to allow message sending. For example, "CPU load is 100%%".
- Click the Send test message button to check whether notification has been configured correctly.
The application sends a test notification to the specified user.
- Click OK to save the changes.
The re-adjusted notification settings are applied to all events that occur on client devices.
You can override notification settings for certain events in the Event configuration section of the Administration Server settings, of a policy settings, or of an application settings.
Creating a certificate for an SMTP server
To create a certificate for an SMTP server:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- Click the Configure notifications and event export link and select the Configure notifications value in the drop-down list.
The event properties window opens.
- On the Email tab, click the Settings link to open the Settings window.
- In the Settings window click the Specify certificate link to open the Certificate for signing window.
- In the Certificate for signing window, click the Browse button.
The Certificate window opens.
- In the Certificate type drop-down list, specify the public or private type of certificate:
- If the private type of certificate (PKCS #12 container) is selected, specify the certificate file and the password.
- If the public type of certificate (X.509 certificate) is selected:
- Specify the private key file (one with the *.prk or *.pem extension).
- Specify the private key password.
- Specify the public key file (one with the *.cer extension).
- Click OK.
The certificate for the SMTP server is issued.
Page topEvent selections
Information about events in the operation of Kaspersky Security Center and managed applications is saved both in the Administration Server database and in the Microsoft Windows system log. You can view information from the Administration Server database in the workspace of the Administration Server node, on the Events tab.
Information on the Events tab is represented as a list of event selections. Each selection includes events of a specific type only. For example, the "Device status is Critical" selection contains only records about changes of device statuses to "Critical". After application installation, the Events tab contains some standard event selections. You can create additional (custom) event selections or export event information to a file.
Viewing an event selection
To view the event selection:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- In the Event selections drop-down list, select the relevant event selection.
If you want events from this selection to be continuously displayed in the workspace, click the star icon (
) next to the selection.
The workspace will display a list of events, stored on the Administration Server, of the selected type.
You can sort information in the list of events in ascending or descending order in any column.
Customizing an event selection
To customize an event selection:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- Open the relevant event selection on the Events tab.
- Click the Selection properties button.
In the event selection properties window that opens you can configure the event selection.
Creating an event selection
To create an event selection:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- Click the Create a selection button.
- In the New event selection window that opens, enter the name of the new selection and click OK.
A selection with the name that you specified is created in the Event selections drop-down list.
By default, a created event selection contains all events stored on the Administration Server. To cause a selection to display only the events you want, you must customize the selection.
Exporting an event selection to a text file
To export an event selection to a text file:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- Click the Import/Export button.
- In the drop-down list, select Export events to file.
The Events Export Wizard starts. Follow the instructions of the Wizard.
Deleting events from a selection
To delete events from a selection:
- In the console tree, select the node with the name of the relevant Administration Server.
- In the workspace of the node, select the Events tab.
- Select the events that you want to delete by using a mouse, the Shift key, or the Ctrl key.
- Delete the selected events in one of the following ways:
- By selecting Delete in the context menu of any of the selected events.
If you select the Delete All item from the context menu, all displayed events will be deleted from the selection, regardless of your choice of events to delete.
- By clicking the Delete event link (if one event is selected) or the Delete events link (if several events are selected) in the information box for these events.
- By selecting Delete in the context menu of any of the selected events.
The selected events are deleted.
Adding applications to exclusions by user requests
When you receive user requests to unblock erroneously blocked applications, you can create an exclusion from the Adaptive Security rules for these applications. Consequently, the applications will no longer be blocked on users' devices. You can track the number of user requests on the Monitoring tab of Administration Server.
To add applications blocked by Kaspersky Endpoint Security to exclusions by user requests:
- In the console tree, select the node with the name of the required Administration Server.
- In the workspace of the node, select the Events tab.
- In the Event selections drop-down list, select User requests.
- Right-click the user request (or several user requests) containing applications that you want to add to exclusions, and then select Add exclusion.
This starts the Add Exclusion Wizard. Follow its instructions.
The selected applications will be excluded from the Triggering of rules in Smart Training state list (under Repositories in the console tree) after the next synchronization of the client device with the Administration Server, and will no longer appear in the list.
Device selections
Information about the status of devices is displayed in the Device selections folder in the console tree.
Information in the Device selections folder is displayed as a list of device selections. Each selection contains devices that meet specific conditions. For example, the Devices with Critical status selection contains only devices with the Critical status. After application installation, the Device selections folder contains some standard selections. You can create additional (custom) device selections, export selection settings to file, or create selections with settings imported from another file.
Viewing a device selection
To view a device selection:
- In the console tree, select the Device selections folder.
- In the workspace of the folder, in the Devices in this selection list, select the relevant device selection.
- Click the Run selection button.
- Click the Selection results tab.
The workspace will display a list of devices that meet the selection criteria.
You can sort the information in the list of devices in ascending or descending order, in any column.
Page topConfiguring a device selection
To configure a device selection:
- In the console tree, select the Device selections folder.
- In the workspace, click the Selection tab, and then click the relevant device selection in the list of user selections.
- Click the Selection properties button.
- In the properties window that opens, specify the following settings:
- General selection properties.
- Conditions that must be met for including devices in this selection. You can configure the conditions after selecting a condition name and clicking the Properties button.
- Security settings.
- Click OK.
The settings are applied and saved.
Below are descriptions of the conditions for assigning devices to a selection. Conditions are combined by using the OR logical operator: the selection will contain devices that comply with at least one of the listed conditions.
General
In the General section, you can change the name of the selection condition and specify whether that condition must be inverted:
Network
In the Network section, you can specify the criteria that will be used to include devices in the selection according to their network data:
Tags
In the Tags section, you can configure criteria for including devices into a selection based on key words (tags) that were previously added to the descriptions of managed devices:
Active Directory
In the Active Directory section, you can configure criteria for including devices into a selection based on their Active Directory data:
- Device is in an Active Directory organizational unit
- Include child organizational units
- This device is a member of an Active Directory group
Network activity
In the Network activity section, you can specify the criteria that will be used to include devices in the selection according to their network activity:
- This device is a distribution point
- Do not disconnect from the Administration Server
- Connection profile switched
- Last connected to Administration Server
- New devices detected by network poll
- Device is visible
Application
In the Application section, you can configure criteria for including devices in a selection based on the selected managed application:
- Application name
- Application version
- Critical update name
- Modules last updated
- Device is managed through Kaspersky Security Center 13.1
- Security application is installed
Operating system
In the Operating system section, you can specify the criteria that will be used to include devices in the selection according to their operating system type.
- Operating system version
- Operating system bit size
- Operating system service pack version
- Operating system build
- Operating system release ID
Device status
In the Device status section, you can configure criteria for including devices into a selection based on the description of the devices status from a managed application:
Protection components
In the Protection components section, you can set up the criteria for including devices in a selection based on their protection status:
Applications registry
In the Applications registry section, you can set up the criteria to search for devices according to applications installed on them:
- Application name
- Application version
- Vendor
- Application status
- Find by update
- Incompatible security application name
- Application tag
- Apply to devices without the specified tags
Hardware registry
In the Hardware registry section, you can configure criteria for including devices into a selection based on their installed hardware:
- Device
- Vendor
- Device name
- Description
- Device vendor
- Serial number
- Inventory number
- User
- Location
- CPU frequency, in MHz
- Virtual CPU cores
- Hard drive volume, in GB
- RAM size, in MB
Virtual machines
In the Virtual machines section, you can set up the criteria to include devices in the selection according to whether these are virtual machines or part of virtual desktop infrastructure (VDI):
Vulnerabilities and updates
In the Vulnerabilities and updates section, you can specify the criteria that will be used to include devices in the selection according to their Windows Update source:
WUA is switched to Administration Server
Users
In the Users section, you can set up the criteria to include devices in the selection according to the accounts of users who have logged in to the operating system.
Status-affecting problems in managed applications
In the Status-affecting problems in managed applications section, you can specify the criteria that will be used to include devices in the selection according to the list of possible problems detected by a managed application. If at least one problem that you select exists on a device, the device will be included in the selection. When you select a problem listed for several applications, you have the option to select this problem in all of the lists automatically.
Statuses of components in managed applications
In the Statuses of components in managed applications section, you can configure criteria for including devices in a selection according to the statuses of components in managed applications:
- Data Leakage Prevention status
- Collaboration servers protection status
- Anti-virus protection status of mail servers
- Endpoint Sensor status
Encryption
Cloud segments
In the Cloud segments section, you can configure criteria for including devices in a selection according to their respective cloud segments:
Application components
This section contains the list of components of those applications that have corresponding management plug-ins installed in Administration Console.
In the Application components section, you can specify criteria for including devices in a selection according to the statuses and version numbers of the components that refer to the application that you select:
Page topExporting the settings of a device selection to a file
To export the settings of a device selection to a text file:
- In the console tree, select the Device selections folder.
- In the workspace, on the Selection tab, click the relevant device selection in the list of user selections.
Settings can be exported only from the device selections created by a user.
- Click the Run selection button.
- On the Selection results tab, click the Export settings button.
- In the Save as window that opens, specify a name for the selection settings export file, select a folder to save it to, and click the Save button.
The settings of the device selection will be saved to the specified file.
Page topCreating a device selection
To create a device selection:
- In the console tree, select the Device selections folder.
- In the workspace of the folder, click Advanced and select the Create a selection in the drop-down list.
- In the New device selection window that opens, enter the name of the new selection and click OK.
A new folder with the name you entered will appear in the console tree in the Device selections folder. By default, the new device selection contains all devices included in administration groups of the Administration Server on which the selection was created. To cause a selection to display only the devices you are particularly interested in, configure the selection by clicking the Selection properties button.
Page topCreating a device selection according to imported settings
To create a device selection according to imported settings:
- In the console tree, select the Device selections folder.
- In the workspace of the folder, click the Advanced button and select Import selection from file in the drop-down list.
- In the window that opens, specify the path to the file from which you want to import the selection settings. Click the Open button.
A New selection entry is created in the Device selections folder. The settings of the new selection are imported from the file that you specified.
If a selection named New selection already exists in the Device selections folder, an index in (<next sequence number>) format is added to the name of the created selection, for example: (1), (2).
Page topRemoving devices from administration groups in a selection
When working with a device selection, you can remove devices from administration groups right in this selection, without switching to the administration groups from which these devices must be removed.
To remove devices from administration groups:
- In the console tree, select the Device selections folder.
- Select the devices that you want to remove by using the Shift or Ctrl keys.
- Remove the selected devices from administration groups in one of the following ways:
- Select Delete in the context menu of any of the selected devices.
- Click the Perform action button and select Remove from group in the drop-down list.
The selected devices are removed from their respective administration groups.
Page topMonitoring of applications installation and uninstallation
You can monitor installation and uninstallation of specific applications on managed devices (for example, a specific browser). To use this function, you can add applications from the Application registry to the list of monitored applications. When a monitored application is installed or uninstalled, Network Agent publishes respective events: Monitored application has been installed or Monitored application has been uninstalled. You can monitor these events using, for example, event selections or reports.
You can monitor these events only if they are stored in Administration Server database.
To add an application to the list of monitored applications:
- In the Advanced → Application management folder in the console tree, select the Applications registry subfolder.
- Above the list of application, that is displayed, click the Show applications registry properties window button.
- In the Monitored Applications window, that is displayed, click the Add button.
- In the Select application name window, that is displayed, select the applications from the Application registry whose installation or uninstallation you want to monitor.
- In the Select application name window, click the OK button.
After you have configured the list of monitored applications, and a monitored application is installed or uninstalled on managed devices in your organization, you can monitor the respective events, for example using the Recent events event selection.
Page topEvent types
Each Kaspersky Security Center component has its own set of event types. This section lists types of events that occur in Kaspersky Security Center Administration Server, Network Agent, iOS MDM Server, and Exchange Mobile Device Server. Types of events that occur in Kaspersky applications are not listed in this section.
Data structure of event type description
For each event type, its display name, identifier (ID), alphabetic code, description, and the default storage term are provided.
- Event type display name. This text is displayed in Kaspersky Security Center when you configure events and when they occur.
- Event type ID. This numerical code is used when you process events by using third-party tools for event analysis.
- Event type (alphabetic code). This code is used when you browse and process events by using public views that are provided in the Kaspersky Security Center database and when events are exported to a SIEM system.
- Description. This text contains the situations when an event occurs and what you can do in such a case.
- Default storage term. This is the number of days during which the event is stored in the Administration Server database and is displayed in the list of events on Administration Server. After this period elapses, the event is deleted. If the event storage term value is 0, such events are detected but are not displayed in the list of events on Administration Server. If you configured to save such events to the operating system event log, you can find them there.
You can change the storage term for events:
- Administration Console: Setting the storage term for an event
- Kaspersky Security Center 13.1 Web Console: Setting the storage term for an event
Other data may include the following fields:
- event_id: unique number of the event in the database, generated and assigned automatically; not to be confused with Event type ID.
- task_id: the ID of the task that caused the event (if any)
- severity: one of the following severity levels (in the ascending order of severity):
0) Invalid severity level
1) Info
2) Warning
3) Error
4) Critical
Administration Server events
This section contains information about the events related to the Administration Server.
Administration Server critical events
The table below shows the event types of Kaspersky Security Center Administration Server that have the Critical importance level.
Administration Server critical events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
License limit has been exceeded |
4099 |
KLSRV_EV_LICENSE_CHECK_MORE_110 |
Once a day Kaspersky Security Center checks whether a licensing restriction is exceeded. Events of this type occur when Administration Server detects that some licensing limits are exceeded by Kaspersky applications installed on client devices and if the number of currently used licensing units covered by a single license exceeds 110% of the total number of units covered by the license. Even when this event occurs, client devices are protected. You can respond to the event in the following ways:
Kaspersky Security Center determines the rules to generate events when a licensing restriction is exceeded. |
180 days |
Virus outbreak |
26 (for File Threat Protection) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Virus outbreak |
27 (for Mail Threat Protection) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Virus outbreak |
28 (for firewall) |
GNRL_EV_VIRUS_OUTBREAK |
Events of this type occur when the number of malicious objects detected on several managed devices exceeds the threshold within a short period of time. You can respond to the event in the following ways:
|
180 days |
Device has become unmanaged |
4111 |
KLSRV_HOST_OUT_CONTROL |
Events of this type occur if a managed device is visible on the network but has not connected to Administration Server for a specific period of time. Find out what prevents the proper functioning of Network Agent on the device. Possible causes include network issues and removal of Network Agent from the device. |
180 days |
Device status is Critical |
4113 |
KLSRV_HOST_STATUS_CRITICAL |
Events of this type occur when a managed device is assigned the Critical status. You can configure the conditions under which the device status is changed to Critical. |
180 days |
The key file has been added to the denylist |
4124 |
KLSRV_LICENSE_BLACKLISTED |
Events of this type occur when Kaspersky has added the activation code or key file that you use to the denylist. Contact Technical Support for more details. |
180 days |
Limited functionality mode |
4130 |
KLSRV_EV_LICENSE_SRV_LIMITED_MODE |
Events of this type occur when Kaspersky Security Center starts to operate with basic functionality, without Vulnerability and Patch Management and without Mobile Device Management features. Following are causes of, and appropriate responses to, the event:
|
180 days |
License expires soon |
4129 |
KLSRV_EV_LICENSE_SRV_EXPIRE_SOON |
Events of this type occur when the commercial license expiration date is approaching. Once a day Kaspersky Security Center checks whether a license expiration date is approaching. Events of this type are published 30 days, 15 days, 5 days and 1 day before the license expiration date. You cannot change the number of days. If the Administration Server is turned off on the specified day before the license expiration date, the event will not be published until the next day. When the commercial license expires, Kaspersky Security Center provides only basic functionality. You can respond to the event in the following ways:
|
180 days |
Certificate has expired |
4132 |
KLSRV_CERTIFICATE_EXPIRED |
Events of this type occur when the Administration Server certificate for Mobile Device Management expires. You need to update the expired certificate. You can configure automatic updates of certificates by selecting the Reissue certificate automatically if possible check box in the certificate issuance settings. |
180 days |
Updates for Kaspersky software modules have been revoked |
4142 |
KLSRV_SEAMLESS_UPDATE_REVOKED |
Events of this type occur if seamless updates have been revoked (Revoked status is displayed for these updates) by Kaspersky technical specialists; for example, they must be updated to a newer version. The event concerns Kaspersky Security Center patches and does not concern modules of managed Kaspersky applications. The event provides the reason that the seamless updates are not installed. |
180 days |
Administration Server functional failure events
The table below shows the event types of Kaspersky Security Center Administration Server that have the Functional failure importance level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy. For Administration Server, you can additionally view the event list in the Administration Server properties.
Administration Server functional failure events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
Runtime error |
4125 |
KLSRV_RUNTIME_ERROR |
Events of this type occur because of unknown issues. Most often these are DBMS issues, network issues, and other software and hardware issues. Details of the event can be found in the event description. |
180 days |
Limit of installations has been exceeded for one of the licensed applications groups |
4126 |
KLSRV_INVLICPROD_EXCEDED |
Administration Server generates events of this type periodically (every hour). Events of this type occur if in Kaspersky Security Center you manage license keys of third-party applications and if the number of installations has exceeded the limit set by the license key of the third-party application. You can respond to the event in the following ways:
You can manage license keys of third-party applications using the functionality of licensed applications groups. A licensed applications group includes third-party applications that meet criteria set by you. |
180 days |
Failed to poll the cloud segment |
4143 |
KLSRV_KLCLOUD_SCAN_ERROR |
Events of this type occur when Administration Server fails to poll a network segment in a cloud environment. Read the details in the event description and respond accordingly. |
Not stored |
Failed to copy the updates to the specified folder |
4123 |
KLSRV_UPD_REPL_FAIL |
Events of this type occur when software updates are copied to an additional shared folder(s). You can respond to the event in the following ways:
|
180 days |
No free disk space |
4107 |
KLSRV_DISK_FULL |
Events of this type occur when the hard drive of the device on which Administration Server is installed runs out of free space. Free up disk space on the device. |
180 days |
Shared folder is not available |
4108 |
KLSRV_SHARED_FOLDER_UNAVAILABLE |
Events of this type occur if the shared folder of Administration Server is not available. You can respond to the event in the following ways:
|
180 days |
The Administration Server database is unavailable |
4109 |
KLSRV_DATABASE_UNAVAILABLE |
Events of this type occur if the Administration Server database becomes unavailable. You can respond to the event in the following ways:
|
180 days |
No free space in the Administration Server database |
4110 |
KLSRV_DATABASE_FULL |
Events of this type occur when there is no free space in the Administration Server database. Administration Server does not function when its database has reached its capacity and when further recording to the database is not possible. Following are the causes of this event, depending on the DBMS that you use, and appropriate responses to the event:
|
180 days |
Administration Server warning events
The table below shows the events of Kaspersky Security Center Administration Server that have the Warning importance level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy. For Administration Server, you can additionally view the event list in the Administration Server properties.
Administration Server warning events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
A frequent event has been detected |
|
KLSRV_EVENT_SPAM_EVENTS_DETECTED |
Events of this type occur when Administration Server detects a frequent event on a managed device. Refer to the following section for details: Blocking frequent events. |
90 days |
License limit has been exceeded |
4098 |
KLSRV_EV_LICENSE_CHECK_100_110 |
Once a day Kaspersky Security Center checks whether a licensing restriction is exceeded. Events of this type occur when Administration Server detects that some licensing limits are exceeded by Kaspersky applications installed on client devices and if the number of currently used licensing units covered by a single license constitute 100% to 110% of the total number of units covered by the license. Even when this event occurs, client devices are protected. You can respond to the event in the following ways:
Kaspersky Security Center determines the rules to generate events when a licensing restriction is exceeded. |
90 days |
Device has remained inactive on the network for a long time |
4103 |
KLSRV_EVENT_HOSTS_NOT_VISIBLE |
Events of this type occur when a managed device shows inactivity for some time. Most often, this happens when a managed device is decommissioned. You can respond to the event in the following ways:
|
90 days |
Conflict of device names |
4102 |
KLSRV_EVENT_HOSTS_CONFLICT |
Events of this type occur when Administration Server considers two or more managed devices as a single device. Most often this happens when a cloned hard drive was used for software deployment on managed devices and without switching the Network Agent to the dedicated disk cloning mode on a reference device. To avoid this issue, switch Network Agent to the disk cloning mode on a reference device before cloning the hard drive of this device. |
90 days |
Device status is Warning |
4114 |
KLSRV_HOST_STATUS_WARNING |
Events of this type occur when a managed device is assigned the Warning status. You can configure the conditions under which the device status is changed to Warning. |
90 days |
Limit of installations will soon be exceeded for one of the licensed applications groups |
4127 |
KLSRV_INVLICPROD_FILLED |
Events of this type occur when the number of installations for third-party applications included in a licensed applications group reaches 90% of the maximum allowed value specified in the license key properties. You can respond to the event in the following ways:
You can manage license keys of third-party applications using the functionality of licensed applications groups. |
90 days |
Certificate has been requested |
4133 |
KLSRV_CERTIFICATE_REQUESTED |
Events of this type occur when a certificate for Mobile Device Management fails to be automatically reissued. Following might be the causes and appropriate responses to the event:
|
90 days |
Certificate has been removed |
4134 |
KLSRV_CERTIFICATE_REMOVED |
Events of this type occur when an administrator removes any type of certificate (General, Mail, VPN) for Mobile Device Management. After removing a certificate, mobile devices connected via this certificate will fail to connect to Administration Server. This event might be helpful when investigating malfunctions associated with the management of mobile devices. |
90 days |
APNs certificate has expired |
4135 |
KLSRV_APN_CERTIFICATE_EXPIRED |
Events of this type occur when an APNs certificate expires. You need to manually renew the APNs certificate and install it on an iOS MDM Server. |
Not stored |
APNs certificate expires soon |
4136 |
KLSRV_APN_CERTIFICATE_EXPIRES_SOON |
Events of this type occur when there are fewer than 14 days left before the APNs certificate expires. When the APNs certificate expires, you need to manually renew the APNs certificate and install it on an iOS MDM Server. We recommend that you schedule the APNs certificate renewal in advance of the expiration date. |
Not stored |
Failed to send the FCM message to the mobile device |
4138 |
KLSRV_GCM_DEVICE_ERROR |
Events of this type occur when Mobile Device Management is configured to use Google Firebase Cloud Messaging (FCM) for connecting to managed mobile devices with an Android operating system and FCM Server fails to handle some of the requests received from Administration Server. It means that some of the managed mobile devices will not receive a push notification. Read the HTTP code in the details of the event description and respond accordingly. For more information on the HTTP codes received from FCM Server and related errors, please refer to the Google Firebase service documentation (see chapter "Downstream message error response codes"). |
90 days |
HTTP error sending the FCM message to the FCM server |
4139 |
KLSRV_GCM_HTTP_ERROR |
Events of this type occur when Mobile Device Management is configured to use Google Firebase Cloud Messaging (FCM) for connecting managed mobile devices with the Android operating system and FCM Server reverts to the Administration Server a request with a HTTP code other than 200 (OK). Following might be the causes and appropriate responses to the event:
|
90 days |
Failed to send the FCM message to the FCM server |
4140 |
KLSRV_GCM_GENERAL_ERROR |
Events of this type occur due to unexpected errors on the Administration Server side when working with the Google Firebase Cloud Messaging HTTP protocol. Read the details in the event description and respond accordingly. If you cannot find the solution to an issue on your own, we recommend that you contact Kaspersky Technical Support. |
90 days |
Little free space on the hard drive |
4105 |
KLSRV_NO_SPACE_ON_VOLUMES |
Events of this type occur when the hard drive of the device on which Administration Server is installed almost runs out of free space. Free up disk space on the device. |
90 days |
Little free space in the Administration Server database |
4106 |
KLSRV_NO_SPACE_IN_DATABASE |
Events of this type occur if space in the Administration Server database is too limited. If you do not remedy the situation, soon the Administration Server database will reach its capacity and Administration Server will not function. Following are the causes of this event, depending on the DBMS that you use, and the appropriate responses to the event. You use the SQL Server Express Edition DBMS:
Review the information on DBMS selection. |
90 days |
Connection to the secondary Administration Server has been interrupted |
4116 |
KLSRV_EV_SLAVE_SRV_DISCONNECTED |
Events of this type occur when a connection to the secondary Administration Server is interrupted. Read the Kaspersky Event Log on the device where the secondary Administration Server is installed and respond accordingly. |
90 days |
Connection to the primary Administration Server has been interrupted |
4118 |
KLSRV_EV_MASTER_SRV_DISCONNECTED |
Events of this type occur when a connection to the primary Administration Server is interrupted. Read the Kaspersky Event Log on the device where the primary Administration Server is installed and respond accordingly. |
90 days |
New updates for Kaspersky software modules have been registered |
4141 |
KLSRV_SEAMLESS_UPDATE_REGISTERED |
Events of this type occur when Administration Server registers new updates for the Kaspersky software installed on managed devices that require approval to be installed. Approve or decline the updates by using Administration Console or using Kaspersky Security Center Web Console. |
90 days |
Deletion of events from the database has started because the limit on the number of events was exceeded |
4145 |
KLSRV_EVP_DB_TRUNCATING |
Events of this type occur when deletion of old events from the Administration Server database has started after the Administration Server database capacity is reached. You can respond to the event in the following ways: |
Not stored |
Events have been deleted from the database because the limit on the number of events was exceeded |
4146 |
KLSRV_EVP_DB_TRUNCATED |
Events of this type occur when old events have been deleted from the Administration Server database after the Administration Server database capacity is reached. You can respond to the event in the following ways: |
Not stored |
Administration Server informational events
The table below shows the events of Kaspersky Security Center Administration Server that have the Info importance level.
Administration Server informational events
Event type display name |
Event type ID |
Event type |
Default storage term |
Remarks |
---|---|---|---|---|
Over 90% of the license key is used up |
4097 |
KLSRV_EV_LICENSE_CHECK_90 |
30 days |
|
New device has been detected |
4100 |
KLSRV_EVENT_HOSTS_NEW_DETECTED |
30 days |
|
Device has been automatically added to the group |
4101 |
KLSRV_EVENT_HOSTS_NEW_REDIRECTED |
30 days |
|
Device has been removed from the group: inactive on the network for a long time |
4104 |
KLSRV_INVISIBLE_HOSTS_REMOVED |
30 days |
|
Limit of installations will soon be exceeded (more than 95% is used up) for one of the licensed applications groups |
4128 |
KLSRV_INVLICPROD_EXPIRED_SOON |
30 days |
|
Files have been found to send to Kaspersky for analysis |
4131 |
KLSRV_APS_FILE_APPEARED |
30 days |
|
FCM Instance ID has changed on this mobile device |
4137 |
KLSRV_GCM_DEVICE_REGID_CHANGED |
30 days |
|
Updates have been successfully copied to the specified folder |
4122 |
KLSRV_UPD_REPL_OK |
30 days |
|
Connection to the secondary Administration Server has been established |
4115 |
KLSRV_EV_SLAVE_SRV_CONNECTED |
30 days |
|
Connection to the primary Administration Server has been established |
4117 |
KLSRV_EV_MASTER_SRV_CONNECTED |
30 days |
|
Databases have been updated |
4144 |
KLSRV_UPD_BASES_UPDATED |
30 days |
|
Audit: Connection to the Administration Server has been established |
4147 |
KLAUD_EV_SERVERCONNECT |
30 days |
|
Audit: Object has been modified |
4148 |
KLAUD_EV_OBJECTMODIFY |
30 days |
This event tracks changes in the following objects:
|
Audit: Object status has changed |
4150 |
KLAUD_EV_TASK_STATE_CHANGED |
30 days |
For example, this event occurs when a task has failed with an error. |
Audit: Group settings have been modified |
4149 |
KLAUD_EV_ADMGROUP_CHANGED |
30 days |
|
Audit: Connection to Administration Server has been terminated |
4151 |
KLAUD_EV_SERVERDISCONNECT |
30 days |
|
Audit: Object properties have been modified |
4152 |
KLAUD_EV_OBJECTPROPMODIFIED |
30 days |
This event tracks changes in the following properties:
|
Audit: User permissions have been modified |
4153 |
KLAUD_EV_OBJECTACLMODIFIED |
30 days |
|
Network Agent events
This section contains information about the events related to Network Agent.
Network Agent functional failure events
The table below shows the event types of Kaspersky Security Center Network Agent that have the Functional failure severity level.
Network Agent functional failure events
Event type display name |
Event type ID |
Event type |
Description |
Default storage term |
---|---|---|---|---|
Update installation error |
7702 |
KLNAG_EV_PATCH_INSTALL_ERROR |
Events of this type occur if automatic updating and patching for Kaspersky Security Center components was not successful. The event does not concern updates of the managed Kaspersky applications. Read the event description. A Windows issue on the Administration Server might be a reason for this event. If the description mentions any issue of Windows configuration, resolve this issue. |
30 days |
Failed to install the third-party software update |
7697 |
KLNAG_EV_3P_PATCH_INSTALL_ERROR |
Events of this type occur if Vulnerability and Patch Management and Mobile Device Management features are in use, and if update of third-party software was not successful. Check whether the link to the third-party software is valid. Read the event description. |
30 days |
Failed to install the Windows Update updates |
7717 |
KLNAG_EV_WUA_INSTALL_ERROR |
Events of this type occur if Windows Updates were not successful. Configure Windows Updates in a Network Agent policy. Read the event description. Look for the error in the Microsoft Knowledge Base. Contact Microsoft Technical Support if you cannot resolve the issue yourself. |
30 days |
Network Agent warning events
The table below shows the events of Kaspersky Security Center Network Agent that have the Warning severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Network Agent warning events
Event type display name |
Event type ID |
Event type |
Default storage term |
---|---|---|---|
Warning has been returned during installation of the software module update |
7701 |
KLNAG_EV_PATCH_INSTALL_WARNING |
30 days |
Third-party software update installation has completed with a warning |
7696 |
KLNAG_EV_3P_PATCH_INSTALL_WARNING |
30 days |
Third-party software update installation has been postponed |
7698 |
KLNAG_EV_3P_PATCH_INSTALL_SLIPPED |
30 days |
Incident has occurred |
549 |
GNRL_EV_APP_INCIDENT_OCCURED |
30 days |
KSN Proxy has started. Failed to check KSN for availability |
7718 |
KSNPROXY_STARTED_CON_CHK_FAILED |
30 days |
Network Agent informational events
The table below shows the events of Kaspersky Security Center Network Agent that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Network Agent informational events
Event type display name |
Event type ID |
Event type |
Default storage term |
---|---|---|---|
Update for software modules has been installed successfully |
7699 |
KLNAG_EV_PATCH_INSTALLED_SUCCESSFULLY |
30 days |
Installation of the software module update has started |
7700 |
KLNAG_EV_PATCH_INSTALL_STARTING |
30 days |
Application has been installed |
7703 |
KLNAG_EV_INV_APP_INSTALLED |
30 days |
Application has been uninstalled |
7704 |
KLNAG_EV_INV_APP_UNINSTALLED |
30 days |
Monitored application has been installed |
7705 |
KLNAG_EV_INV_OBS_APP_INSTALLED |
30 days |
Monitored application has been uninstalled |
7706 |
KLNAG_EV_INV_OBS_APP_UNINSTALLED |
30 days |
Third-party application has been installed |
7707 |
KLNAG_EV_INV_CMPTR_APP_INSTALLED |
30 days |
New device has been added |
7708 |
KLNAG_EV_DEVICE_ARRIVAL |
30 days |
Device has been removed |
7709 |
KLNAG_EV_DEVICE_REMOVE |
30 days |
New device has been detected |
7710 |
KLNAG_EV_NAC_DEVICE_DISCOVERED |
30 days |
Device has been authorized |
7711 |
KLNAG_EV_NAC_HOST_AUTHORIZED |
30 days |
Windows Desktop Sharing: File has been read |
7712 |
KLUSRLOG_EV_FILE_READ |
30 days |
Windows Desktop Sharing: File has been modified |
7713 |
KLUSRLOG_EV_FILE_MODIFIED |
30 days |
Windows Desktop Sharing: Application has been started |
7714 |
KLUSRLOG_EV_PROCESS_LAUNCHED |
30 days |
Windows Desktop Sharing: Started |
7715 |
KLUSRLOG_EV_WDS_BEGIN |
30 days |
Windows Desktop Sharing: Stopped |
7716 |
KLUSRLOG_EV_WDS_END |
30 days |
Third-party software update has been installed successfully |
7694 |
KLNAG_EV_3P_PATCH_INSTALLED_SUCCESSFULLY |
30 days |
Third-party software update installation has started |
7695 |
KLNAG_EV_3P_PATCH_INSTALL_STARTING |
30 days |
KSN Proxy has started. KSN availability check has completed successfully |
7719 |
KSNPROXY_STARTED_CON_CHK_OK |
30 days |
KSN Proxy has stopped |
7720 |
KSNPROXY_STOPPED |
30 days |
iOS MDM Server events
This section contains information about the events related to iOS MDM Server.
iOS MDM Server functional failure events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Functional failure severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to request the list of profile |
PROFILELIST_COMMAND_FAILED |
30 days |
Failed to install the profile |
INSTALLPROFILE_COMMAND_FAILED |
30 days |
Failed to remove the profile |
REMOVEPROFILE_COMMAND_FAILED |
30 days |
Failed to request the list of provisioning profiles |
PROVISIONINGPROFILELIST_COMMAND_FAILED |
30 days |
Failed to install provisioning profile |
INSTALLPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to remove the provisioning profile |
REMOVEPROVISIONINGPROFILE_COMMAND_FAILED |
30 days |
Failed to request the list of digital certificates |
CERTIFICATELIST_COMMAND_FAILED |
30 days |
Failed to request the list of installed applications |
INSTALLEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to request general information about the mobile device |
DEVICEINFORMATION_COMMAND_FAILED |
30 days |
Failed to request security information |
SECURITYINFO_COMMAND_FAILED |
30 days |
Failed to lock the mobile device |
DEVICELOCK_COMMAND_FAILED |
30 days |
Failed to reset the password |
CLEARPASSCODE_COMMAND_FAILED |
30 days |
Failed to wipe data from the mobile device |
ERASEDEVICE_COMMAND_FAILED |
30 days |
Failed to install the app |
INSTALLAPPLICATION_COMMAND_FAILED |
30 days |
Failed to set the redemption code for the app |
APPLYREDEMPTIONCODE_COMMAND_FAILED |
30 days |
Failed to request the list of managed apps |
MANAGEDAPPLICATIONLIST_COMMAND_FAILED |
30 days |
Failed to remove the managed app |
REMOVEAPPLICATION_COMMAND_FAILED |
30 days |
Roaming settings have been rejected |
SETROAMINGSETTINGS_COMMAND_FAILED |
30 days |
Error has occurred in the app operation |
PRODUCT_FAILURE |
30 days |
Command result contains invalid data |
MALFORMED_COMMAND |
30 days |
Failed to send the push notification |
SEND_PUSH_NOTIFICATION_FAILED |
30 days |
Failed to send the command |
SEND_COMMAND_FAILED |
30 days |
Device not found |
DEVICE_NOT_FOUND |
30 days |
iOS MDM Server warning events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Warning severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server warning events
Event type display name |
Event type |
Default storage term |
---|---|---|
Attempt to connect a locked mobile device has been detected |
INACTICE_DEVICE_TRY_CONNECTED |
30 days |
Profile has been removed |
MDM_PROFILE_WAS_REMOVED |
30 days |
Attempt to re-use a client certificate has been detected |
CLIENT_CERT_ALREADY_IN_USE |
30 days |
Inactive device has been detected |
FOUND_INACTIVE_DEVICE |
30 days |
Redemption code is required |
NEED_REDEMPTION_CODE |
30 days |
Profile has been included in a policy removed from the device |
UMDM_PROFILE_WAS_REMOVED |
30 days |
iOS MDM Server informational events
The table below shows the events of Kaspersky Security Center iOS MDM Server that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
iOS MDM Server informational events
Event type display name |
Event type |
Default storage term |
---|---|---|
New mobile device has been connected |
NEW_DEVICE_CONNECTED |
30 days |
List of profiles has been successfully requested |
PROFILELIST_COMMAND_SUCCESSFULL |
30 days |
Profile has been successfully installed |
INSTALLPROFILE_COMMAND_SUCCESSFULL |
30 days |
Profile has been successfully removed |
REMOVEPROFILE_COMMAND_SUCCESSFULL |
30 days |
List of provisioning profiles has been successfully requested |
PROVISIONINGPROFILELIST_COMMAND_SUCCESSFULL |
30 days |
Provisioning profile has been successfully installed |
INSTALLPROVISIONINGPROFILE_COMMAND_SUCCESSFULL |
30 days |
Provisioning profile has been successfully removed |
REMOVEPROVISIONINGPROFILE_COMMAND_SUCCESSFULL |
30 days |
List of digital certificates has been successfully requested |
CERTIFICATELIST_COMMAND_SUCCESSFULL |
30 days |
List of installed applications has been successfully requested |
INSTALLEDAPPLICATIONLIST_COMMAND_SUCCESSFULL |
30 days |
General information about the mobile device has been successfully requested |
DEVICEINFORMATION_COMMAND_SUCCESSFULL |
30 days |
Security information has been successfully requested |
SECURITYINFO_COMMAND_SUCCESSFULL |
30 days |
Mobile device has been successfully locked |
DEVICELOCK_COMMAND_SUCCESSFULL |
30 days |
The password has been successfully reset |
CLEARPASSCODE_COMMAND_SUCCESSFULL |
30 days |
Data has been wiped from the mobile device |
ERASEDEVICE_COMMAND_SUCCESSFULL |
30 days |
App has been successfully installed |
INSTALLAPPLICATION_COMMAND_SUCCESSFULL |
30 days |
Redemption code has been successfully set for the app |
APPLYREDEMPTIONCODE_COMMAND_SUCCESSFULL |
30 days |
The list of managed apps has been successfully requested |
MANAGEDAPPLICATIONLIST_COMMAND_SUCCESSFULL |
30 days |
Managed app has been removed successfully |
REMOVEAPPLICATION_COMMAND_SUCCESSFULL |
30 days |
Roaming settings have been successfully applied |
SETROAMINGSETTINGS_COMMAND_SUCCESSFUL |
30 days |
Exchange Mobile Device Server events
This section contains information about the events related to an Exchange Mobile Device Server.
Exchange Mobile Device Server functional failure events
The table below shows the events of Kaspersky Security Center Exchange Mobile Device Server that have the Functional failure severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Exchange Mobile Device Server functional failure events
Event type display name |
Event type |
Default storage term |
---|---|---|
Failed to wipe data from the mobile device |
WIPE_FAILED |
30 days |
Cannot delete information about mobile device connection to mailbox |
DEVICE_REMOVE_FAILED |
30 days |
Failed to apply the ActiveSync policy to the mailbox |
POLICY_APPLY_FAILED |
30 days |
Application operation error |
PRODUCT_FAILURE |
30 days |
Failed to modify the state of ActiveSync functionality |
CHANGE_ACTIVE_SYNC_STATE_FAILED |
30 days |
Exchange Mobile Device Server informational events
The table below shows the events of Kaspersky Security Center Exchange Mobile Device Server that have the Info severity level.
You can view the full list of events that can be generated by an application on the Event configuration tab in the application policy.
Exchange Mobile Device Server informational events
Event type display name |
Event type |
Default storage term |
---|---|---|
New mobile device has connected |
NEW_DEVICE_CONNECTED |
30 days |
Data has been wiped from the mobile device |
WIPE_SUCCESSFULL |
30 days |
Blocking frequent events
This section provides information about managing frequent events blocking, about removing blocking of frequent events, and about exporting the list of frequent events to a file.
About blocking frequent events
A managed application, for example, Kaspersky Endpoint Security for Windows, installed on a single or several managed devices can send a lot of events of the same type to the Administration Server. Receiving frequent events may overload the Administration Server database and overwrite other events. Administration Server starts blocking the most frequent events when the number of all the received events exceeds the specified limit for the database.
Administration Server blocks the frequent events from receiving automatically. You cannot block the frequent events yourself, or choose which events to block.
If you want to find out if an event is blocked, you can check if this event is present in the Blocking frequent events section of the Administration Server properties. If the event is blocked, you can do the following:
- If you want to prevent overwriting the database, you can continue blocking such type of events from receiving.
- If you want, for example, to find the reason of sending the frequent events to the Administration Server, you can unblock frequent events and continue receiving the events of this type anyway.
- If you want to continue receiving the frequent events until they become blocked again, you can remove from blocking the frequent events.
Managing frequent events blocking
Administration Server automatically blocks the receiving of frequent events, but you can stop blocking and continue to receive frequent events. You can also block receiving frequent events that you unblocked before.
To manage frequent events blocking:
- In the Kaspersky Security Center console tree, open the context menu of the Administration Server folder, and then select Properties.
- In the Administration Server properties window, go to the Sections pane, and then select Blocking frequent events.
- In the Blocking frequent events section:
- Select the Event type options of the events that you want to block from being received.
- Unselect the Event type options of the events that you want to continue receiving.
- Click the Apply button.
- Click the OK button.
Administration Server receives the frequent events for which you unselected the option Event type and blocks receiving frequent events for which you selected the option Event type.
Removing blocking of frequent events
You can remove blocking for frequent events and start receiving them until Administration Server blocks this type of frequent events again.
To remove blocking of frequent events:
- In the Kaspersky Security Center console tree, open the context menu of the Administration Server folder, and then select Properties.
- In the Administration Server properties window, go to the Sections pane, and then select Blocking frequent events.
- In the Blocking frequent events section, click the row of the frequent event for which you want to remove blocking.
- Click the Delete button.
The frequent event is removed from the list of the frequent events. Administration Server will receive events of this type.
Exporting a list of frequent events to a file
To export a list of frequent events to a file:
- In the Kaspersky Security Center console tree, open the context menu of the Administration Server folder, and then select Properties.
- In the Administration Server properties window, go to the Sections pane, and then select Blocking frequent events.
- Click the Export to file button.
- In the Save as window that opens, specify the path to the file to which you want to save the list.
- Click the Save button.
All the records on the frequent events list are exported to a file.
Controlling changes in the status of virtual machines
Administration Server stores information about the status of managed devices, such as the hardware registry and the list of installed applications, and the settings of managed applications, tasks and policies. If a virtual machine functions as a managed device, the user can restore its status at any time using a previously created snapshot of the virtual machine. Information about the status of the virtual machine on Administration Server may become outdated.
For example, the administrator had created a protection policy on Administration Server at 12:00 PM, which started to run on virtual machine VM_1 at 12:01 PM. At 12:30 PM, the user of virtual machine VM_1 changed its status by restoring it from a snapshot made at 11:00 AM. The protection policy stops running on the virtual machine. However, outdated information stored on Administration Server states that the protection policy on virtual machine VM_1 continues.
Kaspersky Security Center allows you to monitor changes in the status of virtual machines.
After each synchronization with a device, the Administration Server generates a unique ID that is stored on the device and on the Administration Server. Before starting the next synchronization, Administration Server compares the values of those IDs on both sides. If the values of the IDs do not match, Administration Server recognizes the virtual machine as restored from a snapshot. Administration Server resets all the settings of policies and tasks that are active for the virtual machine and sends it the up-to-date policies and the list of group tasks.
Page topMonitoring the anti-virus protection status using information from the system registry
To monitor the anti-virus protection status on a client device using information logged by Network Agent, depending on the operating system of the device:
- On the devices running Windows:
- Open the system registry of the client device (for example, locally, using the regedit command in the Start → Run menu).
- Go to the following hive:
- For 32-bit systems:
HKEY_LOCAL_MACHINE\SOFTWARE\KasperskyLab\Components\34\1103\1.0.0.0\Statistics\AVState
- For 64-bit systems:
HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\KasperskyLab\Components\34\1103\1.0.0.0\Statistics\AVState
The system registry displays information about the anti-virus protection status of the client device.
- For 32-bit systems:
- On the devices running Linux:
- Information is enclosed in separate text files, one for each type of data, located at /var/opt/kaspersky/klnagent/1103/1.0.0.0/Statistics/AVState/.
- On the devices running macOS:
- Information is enclosed in separate text files, one for each type of data, located at /Library/Application Support/Kaspersky Lab/klnagent/Data/1103/1.0.0.0/Statistics/AVState/.
The anti-virus protection status corresponds to the values of the keys described in the table below.
Registry keys and their possible values
Key (data type) |
Value |
Description |
---|---|---|
|
DD-MM-YYYY HH-MM-SS |
Date and time (in UTC format) of the last connection to the Administration Server |
|
IP, DNS name, or NetBIOS name |
Name of the Administration Server that manages the device |
|
a.b.c.d |
Build number of the Network Agent installed on the device |
|
a.b.c.d (patch1; patch2; ...; patchN) |
Full number of the Network Agent version (with patches) installed on the device |
|
Device ID |
ID of the device |
|
0 — no 1 — yes |
The Network Agent is installed in the dynamic VDI mode |
|
0 — no 1 — yes |
A security application is installed on the device |
|
0 — no 1 — yes |
Real-time protection is enabled on the device |
|
0 — no 1 — yes |
A real-time protection component is installed |
|
Real-time protection status: |
|
0 |
Unknown |
|
1 |
Disabled |
|
2 |
Paused |
|
3 |
Starting |
|
4 |
Enabled |
|
5 |
Enabled with the high protection level (maximum protection) |
|
6 |
Enabled with the low protection level (maximum speed) |
|
7 |
Enabled with the default (recommended) settings |
|
8 |
Enabled with custom settings |
|
9 |
Operation failure |
|
|
DD-MM-YYYY HH-MM-SS |
Date and time (in UTC format) of the last full scan |
|
DD-MM-YYYY HH-MM-SS |
Date and time (in UTC format) of the application databases release |
Viewing and configuring the actions when devices show inactivity
If client devices within a group are inactive, you can get notifications about it. You can also automatically delete such devices.
To view or configure the actions when the devices in the group show inactivity:
- In the console tree, right-click the name of the required administration group.
- In the context menu, select Properties.
This opens the administration group properties window.
- In the Properties window, go to the Devices section.
- If needed, enable or disable the following options:
- Click OK.
Your changes are saved and applied.
Disabling Kaspersky announcements
In Kaspersky Security Center 13.1 Web Console, the Kaspersky announcements section (MONITORING & REPORTING → Kaspersky announcements) keeps you informed by providing information related to your version of Kaspersky Security Center and the managed applications installed on managed devices. If you do not want to receive Kaspersky announcements, you can disable this feature.
The Kaspersky announcements include two types of information: security-related announcements and marketing announcements. You can disable the announcements of each type separately.
To disable security-related announcements:
- In the console tree, select the Administration Server for which you want to disable security-related announcements.
- Right-click and in the context menu that appears, select Properties.
- In the Administration Server properties window that opens, in the Kaspersky announcements section, disable the Enable the display of Kaspersky announcements in Kaspersky Security Center 13.1 Web Console option.
- Click OK.
Kaspersky announcements are disabled.
Marketing announcements are disabled by default. You receive marketing announcements only if you enabled Kaspersky Security Network (KSN). You can disable this type of announcement by disabling KSN.