The following settings are saved and imported without changing their values:
- Component and task settings
- Task logs and system audit logs
- The contents of Quarantine and Backup
- Accounts whose rights are used to launch tasks
- Rights to control the application
- Task notifications
When migrating to the new version, the following settings are reset:
- All counters, including the statuses of anti-virus databases and whether updates are needed
- Information about installed software module and anti-virus database updates
- Task execution statuses
- Rights to control the Kaspersky Security service
- Application and component settings configured through the registry
- Application and component settings changed and configured as a result of the installation of critical fixes
After the migration from the Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition version, the application events that are published to the Windows Event Log stop outputting to the Windows Event Log Snap-in. If you want to enable the application events outputting to the Windows Event Log Snap-in, you need to reboot a protected server or to restart the Windows Event Log Service.
Rules for applications launch control
When migrating to the new version, the application saves your lists of applications launch control rules without changing them. You don’t need to generate the lists again from scratch. An administrator can also import a configuration file created from rules used in previous versions into the Applications Launch Control task settings in the new version of Kaspersky Security for Windows Server.
When migrating to the new version, we recommend that you stop the Applications Launch Control task if it is running in Active mode, or switch the task to Statistics Only mode. After the migration is complete, we recommend that you use the Statistics Only mode to check the updated lists of rules and verify they work as expected.
List of untrusted computers
The new version of the application changes the mechanism used to block client computers exhibiting harmful file activity or encryption activity:
- The new version eliminates the Untrusted Hosts Blocking task.
- Blocking is now implemented by a change in the way the Real-Time File Protection and Anti-Cryptor tasks run.
- Lists of compromised client computers are saved in the Blocked Hosts storage.
- Settings for automatically unblocking a compromised client computer are configured in the properties for the Blocked Hosts storage.
After migrating to the new version of the application, lists of blocked hosts are not saved. Immediately after migrating and starting real-time protection tasks and the Anti-Cryptor task, the application automatically blocks access to network file resources according to the default settings for protection tasks using the Blocked Hosts storage.
Settings for automatically unblocking access to blocked network file resources are preserved during the migration process.