How to create a Kaspersky Security Center 9.0 policy for Kaspersky Endpoint Security 8 for Linux
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.
Accept and close

 

 

Kaspersky Endpoint Security 8 for Linux

 
 
 

How to create a Kaspersky Security Center 9.0 policy for Kaspersky Endpoint Security 8 for Linux

Back to "Remote Administration"
2014 Apr 22 ID: 7627
 
 
 
 

Applies to Kaspersky Endpoint Security 8 for Linux

Kaspersky Endpoint Security 8 for Linux can be managed via Kaspersky Security Center 9.0, including creation of tasks and group policies.

Before creating a policy for Kaspersky Endpoint Security 8 for Linux, ensure the following:

  • you have installed the administration console plugin;

  • you have installed Network Agent on the managed computer, and it is connected to your Administration Server;
In order to create a policy for Kaspersky Endpoint Security 8 for Linux:
  1. Open the console node Managed computers and right-click the node Policies;



  2. Select the option Create a Policy;

  3. Enter a policy name, click Next;

  4. Select Kaspersky Endpoint Security 8 for Linux in the drop-down menu and click Next;

  5. It is then necessary to specify at least one scan area for the Real-time protection task by clicking Add:



    Configure the scan area as necessary:



    • tab Area – area name, file system type and path (if Local, Mounted or Shared type selected);

    • tab Access rights – user permissions for the Real-time protection tab (for users or groups of users);

    • tab Settings – protection mode (smart mode, when opened, when opened and modified), compound objects scan, scan optimization, heuristic analyzer (button Additionally);

    • tab Actions – actions applied to infected/suspicious objects, actions depending on threat type (button Select actions);

    • tab Exclusion area – list of objects excluded from scan (using a mask or threat name).

      Click OK when the configuration is complete.

  6. Click Next. You can then configure an exclusion area for the Real-Time protection task by clicking Add. This is a global exclusion area for all scan areas. Click Next;



  7. Click Finish to complete creation of the policy.
 
 
 
 
Was this information helpful?
Yes No
 

 
 

Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.