Kaspersky Endpoint Security 10 for Windows protection components

 

 

Kaspersky Endpoint Security for Windows

 
 
 

Kaspersky Endpoint Security 10 for Windows protection components

Back to "Installation and Removal"
2014 Mar 17 ID: 9366
 
 
 
 

The following protection components can be installed on a workstation:

  • File Anti-Virus,
  • Mail Anti-Virus,
  • Web Anti-Virus,
  • IM Anti-Virus,
  • Firewall,
  • Network Attack Blocker,
  • System Watcher,
  • Application Startup Control,
  • Application Privilege Control,
  • Vulnerability Monitor,
  • Device Control,
  • Web Control,
  • Encryption of hard drives,
  • File Encryption,
  • Anti-virus scan, vulnerability scan, and update tasks,
  • Kaspersky Security Center 10 Network Agent Connector.

The following protection components can be installed on a server:

  • File Anti-Virus
  • Firewall
  • Network Attack Blocker
  • Anti-virus scan, vulnerability scan, and update tasks,
  • Kaspersky Security Center 10 Network Agent Connector.


File Anti-Virus

File Anti-Virus protects the file system of a computer. The component gets started on system boot, and stays resident in RAM. It scans all the files opened, saved, and executed by a user on the computer and all mounted disks. The component intercepts each file access instance and scans such files for viruses and other malware.


Mail Anti-Virus

This component scans all incoming and outgoing mail for viruses and other malware.


Web Anti-Virus

Web Anti-Virus intercepts and blocks the execution of potentially dangerous scripts on web pages. Web Anti-Virus protects the data incoming to and outgoing from a local host over HTTP and FTP, and detects links leading to suspicious or phishing web addresses.


IM Anti-Virus

IM Anti-Virus protects the data incoming to a local host over protocols used by instant messengers. It allows secure use of many instant messaging systems.


Firewall

Firewall protects personal data stored on a local host by blocking all the threats that can be potentially dangerous for the operating system while the host is connected to the Internet or LAN. It filters all the network activity using two types of rules: software network rules, and network package rules. 


Network Attack Blocker

This component monitors the network traffic for activity typical of network attacks. Upon detecting a network attack, it blocks the attacking computer. 


System Watcher

System Watcher accumulates the information about software activity on a local host and shares it with other protection components for added efficiency.

Exploit Protection technology has been implemented. (new)

Application Startup Control

Application Startup Control monitors and controls user attempts to start applications.


Application Privilege Control

Application Privilege Control registers the activity of software in the OS, and regulates it according to the rules set fot different software groups. These rules determine software access to user's personal data and operating system resources. This data includes user files (My Documents folder, cookies, history), and files, folders, and registry keys containing settings and core data of frequently used software.


Vulnerability Monitor

Vulnerability Monitor performs real-time scanning of the software being run / running on a local host.


Device Control

Device Control allows configuring flexible access restrictions to data storage devices (hard disks, removable devices, streamers, CD/DVD drives), data transmission devices (modems), data output devices (printers), and connection interfaces (USB, Bluetooth, Infrared).


Web Control

Web Control allows configuring flexible user-specific access restrictions to web pages. 


Encryption of hard drives (new)

This new component allows encrypting entire hard disks and removable devices.

File Encryption  (new)

This new component allows encrypting the files stored on hard disks and removable devices.

 
 
 
 
Was this information helpful?
Yes No
 

 
 

Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.