- Kaspersky for Linux Help
- About Kaspersky for Linux
- Preparing to install the Kaspersky application
- How to install and configure the application
- How to install the application and perform its initial configuration
- Post-installation configuration of the application in interactive mode
- Selecting the locale
- Viewing the End User License Agreement and the Privacy Policy
- Accepting the End User License Agreement
- Accepting the Privacy Policy
- Using Kaspersky Security Network
- Removing users from the privileged group
- Assigning the Administrator role to a user
- Determining the file operation interceptor type
- Enabling automatic configuration of SELinux
- Configuring the update source
- Configuring proxy server settings
- Starting an application database update
- Enabling automatic application database update
- Application activation
- Initial configuration of the application after installation
- Settings in the configuration file for post-installation configuration
- Configuring allowing rules in the SELinux system
- How to update a previous version of the application
- How to remove the application
- Application licensing
- Data provision
- Managing the application on the My Kaspersky portal
- How to activate the application and manage license keys
- How to subscribe
- How to add or remove a license key using the command line
- How to view license information on the command line
- How to add or remove a license key using the application interface
- How to view license information in the application interface
- How to renew your subscription
- How to recover an activation code
- How to manage the application
- How to manage the application using the command line
- How to enable autocomplete of the kfl-control command (bash completion)
- How to manage tasks using the command line
- How to view the list of tasks on the command line
- How to view the status of a task on the command line
- How to create a task on the command line
- How to start, stop, pause, and resume a task on the command line
- How to delete a task on the command line
- How to output task settings to the console or into a configuration file
- How to manage task settings on the command line
- How to configure the task schedule on the command line
- How to manage general application settings on the command line
- How to filter query results on the command line
- How to export and import application settings on the command line
- How to manage user roles
- How to manage the application using the application interface
- How to manage the application using the command line
- How to start and stop the application
- How to view device protection status and app performance information in the command line
- How to update application databases and modules
- How to configure File Threat Protection
- How to configure the Malware Scan
- How to configure the Critical Areas Scan
- How to configure the Removable Drives Scan
- How to configure Web Threat Protection
- How to configure the Encrypted connections scan
- How to configure Behavior Detection
- How to check the integrity of application components
- Using Kaspersky Security Network
- Advanced application settings
- How to configure a proxy server
- How to configure global exclusions
- How to exclude process memory from scanning
- How to configure the file operation interception mode
- How to configure detection of applications that intruders can use to compromise devices or data
- How to enable application stability monitoring
- How to edit application startup settings
- How to limit memory and CPU resource usage
- How to limit resident memory usage
- How to limit the number of Custom Scan tasks
- Viewing events and reports
- How to manage Backup
- Contact Technical Support
- Limitations and warnings
- Appendices
- Appendix 1. Resource consumption optimization
- Appendix 2. Commands for managing the Kaspersky application
- Appendix 3. Configuration files and default application settings
- Rules for editing application task configuration files
- Preset configuration files
- Default settings for command line tasks
- Default settings for the File_Threat_Protection task (ID:1)
- Default settings for the Scan_My_Computer task (ID:2)
- Default settings for the Scan_File task (ID:3)
- Default settings for the Critical_Areas_Scan task (ID:4)
- Default settings for Update task (ID:6)
- Default settings for the Web_Threat_Protection task (ID:14)
- Default settings for the Removable_Drives_Scan task (ID:16)
- Default settings for the Behavior_Detection task (ID:20)
- General application settings
- Encrypted connections scan settings
- Tasks schedule settings
- Appendix 4. Command line return codes
- Sources of information about the Kaspersky application
- Glossary
- Active key
- Application activation
- Application databases
- Application settings
- Database of malicious web addresses
- Database of phishing web addresses
- Exclusion
- False positive
- File mask
- Infected object
- Kaspersky update servers
- License
- License certificate
- Object disinfection
- Proxy server
- Reserve key
- Startup objects
- Subscription
- Trusted device
- Information about third-party code
- Trademark notices
How to configure a proxy server
You can configure proxy server settings if the users of the client devices use a proxy server to connect to the internet. The Kaspersky application may use a proxy server to connect to Kaspersky servers, for example, when updating application databases and modules or when communicating with Kaspersky Security Network.
The proxy server is not used by default.
You can enable or disable the use of a proxy server by application components in the command line with the help of the UseProxy
and ProxyServer
settings in the general application settings.
You can edit the setting using command line options or a configuration file that contains all general application settings.
The UseProxy
setting can take the following values:
Yes
- enable the use of a proxy server.No
: disable the proxy server.
The ProxyServer
setting lets you define proxy server settings in the format: [<
user
>[:<
password
>]@]<
proxy server address
>[:<
port
>
], where:
<
user
>
is a user name for proxy server authentication.<
password
>
is a user password for proxy server authentication.<
proxy server address
>
is the proxy server IP address or domain name.<
port
>
is the proxy server port.
If no authentication is required for connecting to the proxy server, you do not need to define ProxyServer
.
When connecting via an HTTP proxy, we recommend to use a separate account that is not used to sign in to other systems. An HTTP proxy uses an insecure connection, and the account may be compromised.