What's new in Kaspersky Endpoint Security 8 for Windows Workstation

 

 

Kaspersky Endpoint Security 8 for Windows (for workstations)

 
 
 

What's new in Kaspersky Endpoint Security 8 for Windows Workstation

Back to "Version Info"
2014 Nov 12 ID: 6991
 
 
 
 

The following new features have been introduced in Kaspersky Endpoint Security 8 for Windows:

  • Application control – allows or blocks particular software depending on the corporate security policy. Application control includes:
    • Application Startup Control component. It uses allowing and blocking rules configured by an administrator. The rules can be determined by software categories developed by Kaspersky Lab, or as the administrator may deem fit. Active Directory integration allows assigning these rules to Active Directory users or groups.
    • Application Privilege Control component. It blocks software depending on its threat level and reputation, according to Kaspersky Lab criteria.
    • Vulnerability Monitor component. It detects vulnerabilities in the software installed and run on the computer.
  • New Web Control component. It allows creating restricting and blocking rules for websites. The rules are defined on the basis of web content categories, data types, particular URLs or groups of URLs. Active Directory integration allows integration allows assigning these rules to Active Directory users or groups.
  • New GUI. The main application window displays all the necessary statistics on control and protection components, as well as scan and update task execution.
  • IRC, Mail.ru, AIM protocols traffic scan has been added.
  • Active Directory integration has been added.

Features improved in Kaspersky Endpoint Security 8 for Windows:

  • Improved antivirus protection, in particular due to Kaspersky Security Network integration for receiving the reputation data and files/URLs verdicts.
  • Improved active disinfection technology.
  • Improved self-defense against file, process, and system registry modification.
  • Improved proactive defense technologies:
    • The System Watcher component allows logging software activity;
    • The BSS (Behavior Stream Signatures) proactive defense technology allows identifying malicious behavior using updatable signature database;
    • The disinfection process now allows rolling back malicious actions of malware.
  • Improved Firewall component. It monitors incoming/outgoing traffic by ports, IP addresses, traffic-generating software.
  • Improved IDS (Intrusion Detection System). it is now possible to add exclusions by IP addresses.
  • Improved Device control component:
    • extended list of supported buses and device types;
    • it is now possible to use device serial numbers as criteria;
    • it is now possible to limit access to device file systems on the level of read / write / view device folders tree;
    • added scheduling.
 
 
 
 
Was this information helpful?
Yes No
 
 
 

Applies To:


 

 
 

Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.