Contents
- Planning Kaspersky Security Center deployment
- Typical schemes of protection system deployment
- About planning Kaspersky Security Center deployment in an organization's network
- Selecting a structure for protection of an enterprise
- Standard configurations of Kaspersky Security Center
- How to select a DBMS for Administration Server
- Selecting a DBMS
- Managing mobile devices with Kaspersky Endpoint Security for Android
- Providing internet access to Administration Server
- About distribution points
- Calculating the number and configuration of distribution points
- Hierarchy of Administration Servers
- Virtual Administration Servers
- Information about limitations of Kaspersky Security Center
- Network load
Planning Kaspersky Security Center deployment
This section provides information about the most convenient options for deployment of Kaspersky Security Center components on an organization's network, depending on the following criteria:
- Total number of devices
- Units (local offices, branches) that are detached organizationally or geographically
- Separate networks connected by narrow channels
- Need for internet access to the Administration Server
Typical schemes of protection system deployment
This section describes the standard deployment schemes of a protection system in an enterprise network using Kaspersky Security Center.
The system must be protected against any type of unauthorized access. We recommend that you install all available security updates for your operating system before installing the application on your device and physically protect Administration Server(s) and distribution point(s).
You can use Kaspersky Security Center to deploy a protection system on a corporate network by means of the following deployment schemes:
- Deploying a protection system through Kaspersky Security Center, in one of the following ways:
- Through Administration Console
- Through Kaspersky Security Center 13.1 Web Console
Kaspersky applications are automatically installed on client devices, which in turn are automatically connected to the Administration Server by using Kaspersky Security Center.
The basic deployment scheme is protection system deployment through Administration Console. Using Kaspersky Security Center 13.1 Web Console allows you to launch installation of Kaspersky applications from a browser.
- Deploying a protection system manually using stand-alone installation packages generated by Kaspersky Security Center.
Installation of Kaspersky applications on client devices and the administrator's workstation is performed manually; the settings for connecting client devices to the Administration Server are specified when Network Agent is installed.
This deployment method is recommended in cases when remote installation is not possible.
Kaspersky Security Center also allows you to deploy your protection system using Microsoft Active Directory group policies.
Page topAbout planning Kaspersky Security Center deployment in an organization's network
One Administration Server can support a maximum of 100,000 devices. If the total number of devices on an organization's network exceeds 100,000, multiple Administration Servers must be deployed on that network and combined into a hierarchy for convenient centralized management.
If an organization includes large-scale remote local offices (branches) with their own administrators, it is useful to deploy Administration Servers in those offices. Otherwise, those offices must be viewed as detached networks connected by low-throughput channels; see section "Standard configuration: A few large-scale offices run by their own administrators".
When detached networks connected with narrow channels are used, traffic can be saved by assigning one or several Network Agents to act as distribution points (see table for calculation of the number of distribution points). In this case, all devices on a detached network retrieve updates from such local update centers. Actual distribution points can download updates both from the Administration Server (default scenario), and from Kaspersky servers on the internet (see section "Standard configuration: Multiple small remote offices").
Section "Standard configurations of Kaspersky Security Center" provides detailed descriptions of the standard configurations of Kaspersky Security Center. When planning the deployment, choose the most suitable standard configuration, depending on the organization's structure.
At the stage of deployment planning, the assignment of the special certificate X.509 to the Administration Server must be considered. Assignment of the X.509 certificate to the Administration Server may be useful in the following cases (partial list):
- Inspecting secure socket layer (SSL) traffic by means of an SSL termination proxy or for using a reverse proxy
- Integration with the public keys infrastructure (PKI) of an organization
- Specifying required values in certificate fields
- Providing the required encryption strength of a certificate
Selecting a structure for protection of an enterprise
Selection of a structure for protection of an organization is defined by the following factors:
- Organization's network topology.
- Organizational structure.
- Number of employees in charge of the network protection, and allocation of their responsibilities.
- Hardware resources that can be allocated to protection management components.
- Throughput of communication channels that can be allocated to maintenance of protection components on the organizational network.
- Time limits for execution of critical administrative operations on the organization's network. Critical administrative operations include, for example, the distribution of anti-virus databases and modification of policies for client devices.
When you select a protection structure, it is recommended first to estimate the available network and hardware resources that can be used for the operation of a centralized protection system.
To analyze the network and hardware infrastructure, it is recommended that you follow the process below:
- Define the following settings of the network on which the protection will be deployed:
- Number of network segments.
- Speed of communication channels between individual network segments.
- Number of managed devices in each of the network segments.
- Throughput of each communication channel that can be allocated to maintain the operation of the protection.
- Determine the maximum allowed time for the execution of key administrative operations for all managed devices.
- Analyze information from steps 1 and 2, as well as data from load testing of the administration system. Based on the analysis, answer the following questions:
- Is it possible to serve all the clients with a single Administration Server, or is a hierarchy of Administration Servers required?
- Which hardware configuration of Administration Servers is required in order to deal with all the clients within the time limits specified in step 2?
- Is it required to use distribution points to reduce load on communication channels?
Upon obtaining answers to the questions in step 3 above, you can compile a set of allowed structures of the organization's protection.
On the organization's network you can use one of the following standard protection structures:
- One Administration Server. All client devices are connected to a single Administration Server. Administration Server functions as distribution point.
- One Administration Server with distribution points. All client devices are connected to a single Administration Server. Some of the networked client devices function as distribution points.
- Hierarchy of Administration Servers. For each network segment, an individual Administration Server is allocated and becomes part of a general hierarchy of Administration Servers. The primary Administration Server functions as distribution point.
- Hierarchy of Administration Servers with distribution points. For each network segment, an individual Administration Server is allocated and becomes part of a general hierarchy of Administration Servers. Some of the networked client devices function as distribution points.
Standard configurations of Kaspersky Security Center
This section describes the following standard configurations used for deployment of Kaspersky Security Center components on an organization's network:
- Single office
- A few large-scale offices, which are geographically detached and run by their own administrators
- Multiple small offices, which are geographically detached
Standard configuration: Single office
One or several Administration Servers can be deployed on the organization's network. The number of Administration Servers can be selected either based on available hardware, or on the total number of managed devices.
One Administration Server can support up to 100,000 devices. You must consider the possibility of increasing the number of managed devices in the near future: it may be useful to connect a slightly smaller number of devices to a single Administration Server.
Administration Servers can be deployed either on the internal network, or in the DMZ, depending on whether internet access to the Administration Servers is required.
If multiple Servers are used, it is recommended that you combine them into a hierarchy. Using an Administration Server hierarchy allows you to avoid dubbed policies and tasks, and handle the whole set of managed devices as if they are managed by a single Administration Server (that is, search for devices, build selections of devices, and create reports).
Standard configuration: A few large-scale offices run by their own administrators
If an organization has a few large-scale, geographically separate offices, you must consider the option of deploying Administration Servers at each of the offices. One or several Administration Servers can be deployed per office, depending on the number of client devices and hardware available. In this case, each of the offices can be viewed as a "Standard configuration: Single office". For ease of administration, it is recommended to combine all of the Administration Servers into a hierarchy (possibly multi-level).
If some employees move between offices with their devices (laptops), create Network Agent connection profiles in the Network Agent policy. Network Agent connection profiles are only supported for Windows and MacOS hosts.
Standard configuration: Multiple small remote offices
This standard configuration provides for a headquarters office and many remote small offices that may communicate with the HQ office over the internet. Each of the remote offices may be located behind a Network Address Translation (NAT), that is, no connection can be established between two remote offices because they are isolated.
An Administration Server must be deployed at the headquarters office, and one or multiple distribution points must be assigned to all other offices. If the offices are linked through the internet, it may be useful to create a Download updates to the repositories of distribution points task for the distribution points, so that they will download updates directly from Kaspersky servers, local or network folder, not from the Administration Server.
If some devices at a remote office have no direct access to the Administration Server (for example, access to the Administration Server is provided over the internet but some devices have no internet access), distribution points must be switched into connection gateway mode. In this case, Network Agents on devices at the remote office will be connected, for further synchronization, to the Administration Server—but through the gateway, not directly.
As the Administration Server, most probably, will not be able to poll the remote office network, it may be useful to turn this function over to a distribution point.
The Administration Server will not be able to send notifications to port 15000 UDP to managed devices located behind the NAT at the remote office. To resolve this issue, you can enable the mode of continuous connection to the Administration Server in the properties of devices acting as distribution points (Do not disconnect from the Administration Server check box). This mode is available if the total number of distribution points does not exceed 300. Use push servers to make sure that there is continuous connectivity between a managed device and the Administration Server. Refer to the following topic for details: Using a distribution point as a push server.
How to select a DBMS for Administration Server
When selecting the database management system (DBMS) to be used by an Administration Server, you must take into account the number of devices covered by the Administration Server.
SQL Server Express Edition has limitations on the memory volume used, number of CPU cores used, and maximum size of the database. Therefore, you cannot use SQL Server Express Edition if your Administration Server covers more than 10,000 devices, or if Application Control is used on managed devices. If the Administration Server is used as Windows Server Update Services (WSUS) server, you cannot use SQL Server Express Edition either.
If the Administration Server covers more than 10,000 devices, we recommend that you use SQL Server versions with fewer limitations, such as: SQL Server Workgroup Edition, SQL Server Web Edition, SQL Server Standard Edition, or SQL Server Enterprise Edition.
If the Administration Server covers 50,000 devices (or less), and if Application Control is not used on managed devices, you can also use MySQL 8.0.20 and the later versions.
If the Administration Server covers 20,000 devices (or fewer) and if Application Control is not used on managed devices, you can use MariaDB Server 10.3 as the DBMS.
If the Administration Server covers 10,000 devices (or less), and if Application Control is not used on managed devices, you can also use MySQL 5.5, 5.6, or 5.7 as the DBMS.
MySQL versions 5.5.1, 5.5.2, 5.5.3, 5.5.4, and 5.5.5 are no longer supported.
If you are using SQL Server 2019 as a DBMS and you do not have cumulative patch CU12 or later, you have to perform the following after installing Kaspersky Security Center:
- Connect to SQL Server using SQL Management Studio.
- Run the following commands (if you chose a different name for the database, use that name instead of KAV):
USE KAV
GO
ALTER DATABASE SCOPED CONFIGURATION SET TSQL_SCALAR_UDF_INLINING = OFF
GO
- Restart the SQL Server 2019 service.
Otherwise, using SQL Server 2019 may result in errors, such as "There is insufficient system memory in resource pool 'internal' to run this query."
Selecting a DBMS
When installing Administration Server, you can select the DBMS that Administration Server will use. When selecting the database management system (DBMS) to be used by an Administration Server, you must take into account the number of devices covered by the Administration Server.
The following table lists the valid DBMS options, as well as the restrictions on their use.
Restrictions on DBMS
DBMS |
Restrictions |
---|---|
SQL Server Express Edition 2012 or later |
Not recommended if you intend to run a single Administration Server for more than 10,000 devices or to use Application Control. |
Local SQL Server edition, other than Express, 2012 or later |
No limitations. |
Remote SQL Server edition, other than Express, 2012 or later |
Only valid if both devices are in the same Windows domain; if the domains differ, a two-way trust relationship must be established between them. |
Local or remote MySQL 5.5, 5.6, or 5.7 (MySQL versions 5.5.1, 5.5.2, 5.5.3, 5.5.4, and 5.5.5 are no longer supported) |
Not recommended if you intend to run a single Administration Server for more than 10,000 devices or to use Application Control. |
Local or remote MariaDB Server 10.3, MariaDB 10.3 (build 10.3.22 or later) |
Not recommended if you intend to run a single Administration Server for more than 20,000 devices or to use Application Control. |
If you are using SQL Server 2019 as a DBMS and you do not have cumulative patch CU12 or later, you have to perform the following after installing Kaspersky Security Center:
- Connect to SQL Server using SQL Management Studio.
- Run the following commands (if you chose a different name for the database, use that name instead of KAV):
USE KAV
GO
ALTER DATABASE SCOPED CONFIGURATION SET TSQL_SCALAR_UDF_INLINING = OFF
GO
- Restart the SQL Server 2019 service.
Otherwise, using SQL Server 2019 may result in errors, such as "There is insufficient system memory in resource pool 'internal' to run this query."
Concurrent use of the SQL Server Express Edition DBMS by Administration Server and another application is strictly forbidden.
Managing mobile devices with Kaspersky Endpoint Security for Android
Mobile devices with installed Kaspersky Endpoint Security for Android (hereinafter referred to as KES devices) are managed by means of the Administration Server. Kaspersky Security Center 10 Service Pack 1, as well as later versions, supports the following features for managing KES devices:
- Handling mobile devices as client devices:
- Membership in administration groups
- Monitoring, such as viewing statuses, events, and reports
- Modifying local settings and assigning policies for Kaspersky Endpoint Security for Android
- Sending commands in centralized mode
- Installing mobile apps packages remotely
Administration Server manages KES devices through TLS, TCP port 13292.
Providing internet access to Administration Server
The following cases require internet access to the Administration Server:
- Regular updating of Kaspersky databases, software modules, and applications
- Updating third-party software
By default, internet connection is not required for Administration Server to install Microsoft software updates on the managed devices. For example, the managed devices can download the Microsoft software updates directly from Microsoft Update servers or from Windows Server with Microsoft Windows Server Update Services (WSUS) deployed in your organization's network. Administration Server must be connected to the internet in the following cases:
- When you use Administration Server as WSUS server
- To install updates of third-party software other than Microsoft software
- Fixing third-party software vulnerabilities
Internet connection is required for Administration Server to perform the following tasks:
- To make a list of recommended fixes for vulnerabilities in Microsoft software. The list is created and regularly updated by Kaspersky specialists.
- To fix vulnerabilities in third-part software other than Microsoft software.
- Managing devices (laptops) of out-of-office users
- Managing devices in remote offices
- Interacting with primary or secondary Administration Servers located in remote offices
- Managing mobile devices
This section describes typical ways of providing access to the Administration Server over the internet. Each of the cases focusing on providing internet access to the Administration Server may require a dedicated certificate for the Administration Server.
Internet access: Administration Server on a local network
If the Administration Server is located on the internal network of an organization, you might want to make TCP port 13000 of the Administration Server accessible from outside by means of port forwarding. If mobile device management is required, you might want to make accessible port 13292 TCP.
Internet access: Administration Server in DMZ
If the Administration Server is located in the DMZ of the organization's network, it has no access to the organization's internal network. Therefore, the following limitations apply:
- The Administration Server cannot detect new devices.
- The Administration Server cannot perform initial deployment of Network Agent through forced installation on devices on the internal network of the organization.
This only applies to the initial installation of Network Agent. Any further upgrades of Network Agent or the security application installation can, however, be performed by the Administration Server. At the same time, the initial deployment of Network Agents can be performed by other means, for example, through group policies of Microsoft Active Directory.
- The Administration Server cannot send notifications to managed devices through port 15000 UDP, which is not critical for the Kaspersky Security Center functioning.
- The Administration Server cannot poll Active Directory. However, results of Active Directory polling are not required in most scenarios.
If the above limitations are viewed as critical, they can be removed by using distribution points located on the organization's network:
- To perform initial deployment on devices without Network Agent, you first install Network Agent on one of the devices and then assign it the distribution point status. As a result, initial installation of Network Agent on other devices will be performed by the Administration Server through this distribution point.
- To detect new devices on the internal network of the organization and poll Active Directory, you must enable the relevant device discovery methods on one of the distribution points.
- To ensure a successful sending of notifications to port 15000 UDP on managed devices located on the internal network of the organization, you must cover the entire network with distribution points. In the properties of the distribution points that were assigned, select the Do not disconnect from the Administration Server check box. As a result, the Administration Server will establish a continuous connection to the distribution points while they will be able to send notifications to port 15000 UDP on devices that are on the organization's internal network.
Internet access: Network Agent as connection gateway in DMZ
Administration Server can be located on the internal network of the organization, and in that network's DMZ there can be a device with Network Agent running as a connection gateway with reverse connectivity (Administration Server establishes a connection to Network Agent). In this case, the following conditions must be met to ensure internet access:
- Network Agent must be installed on the device that is in the DMZ. When you install Network Agent, in the Connection gateway window of the Setup Wizard, select Use Network Agent as a connection gateway in DMZ.
- The device with the installed connection gateway must be added as a distribution point. When you add the connection gateway, in the Add distribution point window, select the Select → Add connection gateway in DMZ by address option.
- To use an internet connection to connect external desktop computers to the Administration Server, the installation package for Network Agent must be corrected. In the properties of the created installation package, select the Advanced → Connect to Administration Server by using connection gateway option, and then specify the newly created connection gateway.
For the connection gateway in the DMZ, Administration Server creates a certificate signed with the Administration Server certificate. If the administrator decides to assign a custom certificate to Administration Server, it must be done before a connection gateway is created in the DMZ.
If some employees use laptops that can connect to Administration Server either from the local network or over the internet, it may be useful to create a switching rule for Network Agent in the Network Agent's policy.
About distribution points
A device with Network Agent installed can be used as a distribution point. In this mode, Network Agent can perform the following functions:
- Distribute updates (these can be retrieved either from the Administration Server or from Kaspersky servers). In the latter case, the Download updates to the repositories of distribution points task must be created for the device that serves as the distribution point:
- Install software (including initial deployment of Network Agents) on other devices.
- Poll the network to detect new devices and update information about existing ones. A distribution point can apply the same device discovery methods as the Administration Server.
Deployment of distribution points on an organization's network has the following objectives:
- Reducing the load on the Administration Server.
- Optimizing traffic.
- Providing the Administration Server with access to devices in hard-to-reach spots of the organization's network. The availability of a distribution point on the network behind a NAT (in relation to the Administration Server) allows the Administration Server to perform the following actions:
- Send notifications to devices over UDP.
- Poll the network.
- Perform initial deployment.
A distribution point is assigned for an administration group. In this case, the scope of the distribution point includes all devices within the administration group and all of its subgroups. However, the device that acts as the distribution point may not be included in the administration group to which it has been assigned.
You can make a distribution point function as a connection gateway. In this case, devices in the scope of the distribution point will be connected to the Administration Server through the gateway, not directly. This mode can be useful in scenarios that do not allow the establishment of a direct connection between the Administration Server and managed devices.
Calculating the number and configuration of distribution points
The more client devices a network contains, the more distribution points it requires. We recommend that you not disable automatic assignment of distribution points. When automatic assignment of distribution points is enabled, Administration Server assigns distribution points if the number of client devices is quite large and defines their configuration.
Using exclusively assigned distribution points
If you plan to use certain specific devices as distribution points (that is, exclusively assigned servers), you can opt out of using automatic assignment of distribution points. In this case, make sure that the devices that you intend to make distribution points have sufficient volume of free disk space, are not shut down regularly, and have Sleep mode disabled.
Number of exclusively assigned distribution points on a network that contains a single network segment, based on the number of networked devices
Number of client devices in the network segment |
Number of distribution points |
---|---|
Less than 300 |
0 (Do not assign distribution points) |
More than 300 |
Acceptable: (N/10,000 + 1), recommended: (N/5000 + 2), where N is the number of networked devices |
Number of exclusively assigned distribution points on a network that contains multiple network segments, based on the number of networked devices
Number of client devices per network segment |
Number of distribution points |
---|---|
Less than 10 |
0 (Do not assign distribution points) |
10–100 |
1 |
More than 100 |
Acceptable: (N/10,000 + 1), recommended: (N/5000 + 2), where N is the number of networked devices |
Using standard client devices (workstations) as distribution points
If you plan to use standard client devices (that is, workstations) as distribution points, we recommend that you assign distribution points as shown in the tables below in order to avoid excessive load on the communication channels and on Administration Server:
Number of workstations functioning as distribution points on a network that contains a single network segment, based on the number of networked devices
Number of client devices in the network segment |
Number of distribution points |
---|---|
Less than 300 |
0 (Do not assign distribution points) |
More than 300 |
(N/300 + 1), where N is the number of networked devices; there must be at least 3 distribution points |
Number of workstations functioning as distribution points on a network that contains multiple network segments, based on the number of networked devices
Number of client devices per network segment |
Number of distribution points |
---|---|
Less than 10 |
0 (Do not assign distribution points) |
10–30 |
1 |
31–300 |
2 |
More than 300 |
(N/300 + 1), where N is the number of networked devices; there must be at least 3 distribution points |
If a distribution point is shut down (or not available for some other reason), the managed devices in its scope can access the Administration Server for updates.
Hierarchy of Administration Servers
An MSP may run multiple Administration Servers. It can be inconvenient to administer several separate Administration Servers, so a hierarchy can be applied. A "primary/secondary" configuration for two Administration Servers provides the following options:
- A secondary Administration Server inherits policies and tasks from the primary Administration Server, thus preventing duplication of settings.
- Selections of devices on the primary Administration Server can include devices from secondary Administration Servers.
- Reports on the primary Administration Server can contain data (including detailed information) from secondary Administration Servers.
Virtual Administration Servers
On the basis of a physical Administration Server, multiple virtual Administration Servers can be created, which will be similar to secondary Administration Servers. Compared to the discretionary access model, which is based on access control lists (ACLs), the virtual Administration Server model is more functional and provides a larger degree of isolation. In addition to a dedicated structure of administration groups for assigned devices with policies and tasks, each virtual Administration Server features its own group of unassigned devices, own sets of reports, selected devices and events, installation packages, moving rules, etc. The functional scope of virtual Administration Servers can be used both by service providers (xSP) to maximize the isolation of customers, and by large-scale organizations with sophisticated workflows and numerous administrators.
Virtual Administration Servers are very similar to secondary Administration Servers, but with the following distinctions:
- A virtual Administration Server lacks most global settings and its own TCP ports.
- A virtual Administration Server has no secondary Administration Servers.
- A virtual Administration Server has no other virtual Administration Servers.
- A physical Administration Server views devices, groups, events, and objects on managed devices (items in Quarantine, applications registry, etc.) of all its virtual Administration Servers.
- A virtual Administration Server can only scan the network with distribution points connected.
Information about limitations of Kaspersky Security Center
The following table displays the limitations of the current version of Kaspersky Security Center.
Limitations of Kaspersky Security Center
Type of limitation |
Value |
---|---|
Maximum number of managed devices per Administration Server |
100,000 |
Maximum number of devices with the Do not disconnect from the Administration Server option selected |
300 |
Maximum number of administration groups |
10,000 |
Maximum number of events to store |
45,000,000 |
Maximum number of policies |
2000 |
Maximum number of tasks |
2000 |
Maximum total number of Active Directory objects (organizational units, OUs) and accounts of users, devices, and security groups) |
1,000,000 |
Maximum number of profiles in a policy |
100 |
Maximum number of secondary Administration Servers on a single primary Administration Server |
500 |
Maximum number of virtual Administration Servers |
500 |
Maximum number of devices that a single distribution point can cover (distribution points can cover non-mobile devices only) |
10,000 |
Maximum number of devices that may use a single connection gateway |
10,000, including mobile devices |
Maximum number of mobile devices per Administration Server |
100,000 minus the number of stationary managed devices |
Network load
This section contains information about the volume of network traffic that the client devices and Administration Server exchange during key administrative scenarios.
The main load on the network is caused by the following administrative scenarios in progress:
- Initial deployment of anti-virus protection
- Initial update of anti-virus databases
- Synchronization of a client device with Administration Server
- Regular updates of anti-virus databases
- Processing of events on client devices by Administration Server
Initial deployment of anti-virus protection
This section provides information about traffic volume values after Network Agent 13.1 and Kaspersky Endpoint Security for Windows are installed on the client device (see the table below).
The Network Agent is installed using forced installation, when the files required for setup are copied by Administration Server to a shared folder on the client device. After installation, the Network Agent retrieves the distribution package of Kaspersky Endpoint Security for Windows, using the connection to the Administration Server.
Traffic
Scenario |
Network Agent installation for a single client device |
Installing Kaspersky Endpoint Security for Windows on one client device (with databases updated) |
Concurrent installation of Network Agent and Kaspersky Endpoint Security for Windows |
---|---|---|---|
Traffic from a client device to Administration Server, KB |
1638.4 |
7843.84 |
9707.52 |
Traffic from Administration Server to a client device, KB |
69,990.4 |
259,317.76 |
329,318.4 |
Total traffic (for a single client device), KB |
71,628.8 |
267,161.6 |
339,025.92 |
After Network Agents are installed on the client devices, one of the devices in the administration group can be assigned to act as distribution point. It is used for distribution of installation packages. In this case, traffic volume transferred during initial deployment of anti-virus protection varies significantly depending on whether you are using IP multicasting.
If IP multicasting is used, installation packages are sent once to all running devices in the administration group. Thus, total traffic becomes N times smaller, where N stands for the total number of running devices in the administration group. If you are not using IP multicasting, the total traffic is identical to the traffic calculated as if the distribution packages are downloaded from the Administration Server. However, the package source is the distribution point, not the Administration Server.
Page topInitial update of anti-virus databases
The traffic rates during initial update of anti-virus databases (when starting the database update task for the first time on a client device), are as follows:
- Traffic from a client device to Administration Server: 1,8 MB.
- Traffic from Administration Server to a client device: 113 MB.
- Total traffic (for a single client device): 114 MB.
The data may vary slightly depending upon the current version of the anti-virus database.
Page topSynchronizing a client with the Administration Server
This scenario describes the state of the administration system when intensive data synchronization occurs between a client device and the Administration Server. Client devices connect to the Administration Server with the interval defined by the administrator. The Administration Server compares the status of data on a client device with that on the Server, records information in the database about the last client device connection, and synchronizes data.
This section contains information about traffic values for basic administration scenarios when connecting a client to the Administration Server (see table below). The data in the table may vary slightly depending upon the current version of the anti-virus database.
Traffic
Scenario |
Traffic from client devices to Administration Server, KB |
Traffic from Administration Server to client devices, KB |
Total traffic (for a single client device), KB |
Initial synchronization prior to updating databases on a client device |
699.44 |
568.42 |
1267.86 |
Initial synchronization after updating databases on a client device |
735.8 |
4474.88 |
5210.68 |
Synchronization with no changes on a client device and the Administration Server |
11.99 |
6.73 |
18.72 |
Synchronization after changing the value of a setting in a group policy |
9.79 |
11.39 |
21.18 |
Synchronization after changing the value of a setting in a group task |
11.27 |
11.72 |
22.99 |
Forced synchronization with no changes on a client device |
77.59 |
99.45 |
177.04 |
Overall traffic volume varies considerably depending on whether IP multicasting is used within administration groups. If IP multicasting is used, the total traffic volume decreases approximately by N times for the group, where N stands for the total number of devices included in the administration group.
The volume of traffic at initial synchronization before and after an update of the databases is specified for the following cases:
- Installing Network Agent and a security application on a client device
- Moving a client device to an administration group
- Applying a policy and tasks that have been created for the group by default, to a client device
The table specifies traffic rates in case of changes to one of the protection settings that are included in the Kaspersky Endpoint Security policy settings. Data for other policy settings may differ from data displayed in the table.
Page topAdditional update of anti-virus databases
The traffic rates in case of an incremental update of anti-virus databases 20 hours after the previous update are as follows:
- Traffic from a client device to Administration Server: 169 KB.
- Traffic from Administration Server to a client device: 16 MB.
- Total traffic (for a single client device): 16.3 MB.
The data in the table may vary slightly depending upon the current version of the anti-virus database.
Traffic volume varies significantly depending on whether IP multicasting is used within administration groups. If IP multicasting is used, the total traffic volume decreases approximately by N times for the group, where N stands for the total number of devices included in the administration group.
Page topProcessing of events from clients by Administration Server
This section provides information about traffic volume values when a client device encounters a "Virus detected" event, which is then sent to the Administration Server and registered in the database (see table below).
Traffic
Scenario |
Data transfer to Administration Server when a "Virus detected" event occurs |
Data transfer to Administration Server when nine "Virus detected" events occur |
---|---|---|
Traffic from a client device to Administration Server, KB |
49.66 |
64.05 |
Traffic from Administration Server to a client device, KB |
28.64 |
31.97 |
Total traffic (for a single client device), KB |
78.3 |
96.02 |
Data in the table may vary slightly depending upon the current version of the anti-virus application and the events that are defined in its policy for registration in the Administration Server database.
Page topTraffic per 24 hours
This section contains information about traffic rates for 24 hours of the administration system's activity in a "quiet" condition, when no data changes are made either by client devices or by the Administration Server (see table below).
Data presented in the table describe the network's condition after standard installation of Kaspersky Security Center and completion of the Quick Start Wizard. The frequency of synchronization of the client device with Administration Server was 20 minutes; updates were downloaded to the Administration Server repository once per hour.
Traffic rates per 24 hours in idle state
Traffic flow |
Value |
---|---|
Traffic from a client device to Administration Server, KB |
3235.84 |
Traffic from Administration Server to a client device, KB |
64,378.88 |
Total traffic (for a single client device), KB |
67,614.72 |