How to create a Kaspersky Security Center 9.0 policy for Kaspersky Endpoint Security 8 for Linux
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.
Accept and close



Kaspersky Endpoint Security 8 for Linux


How to create a Kaspersky Security Center 9.0 policy for Kaspersky Endpoint Security 8 for Linux

Back to "Remote Administration"
2014 Apr 22 ID: 7627

Applies to Kaspersky Endpoint Security 8 for Linux

Kaspersky Endpoint Security 8 for Linux can be managed via Kaspersky Security Center 9.0, including creation of tasks and group policies.

Before creating a policy for Kaspersky Endpoint Security 8 for Linux, ensure the following:

  • you have installed the administration console plugin;

  • you have installed Network Agent on the managed computer, and it is connected to your Administration Server;
In order to create a policy for Kaspersky Endpoint Security 8 for Linux:
  1. Open the console node Managed computers and right-click the node Policies;

  2. Select the option Create a Policy;

  3. Enter a policy name, click Next;

  4. Select Kaspersky Endpoint Security 8 for Linux in the drop-down menu and click Next;

  5. It is then necessary to specify at least one scan area for the Real-time protection task by clicking Add:

    Configure the scan area as necessary:

    • tab Area – area name, file system type and path (if Local, Mounted or Shared type selected);

    • tab Access rights – user permissions for the Real-time protection tab (for users or groups of users);

    • tab Settings – protection mode (smart mode, when opened, when opened and modified), compound objects scan, scan optimization, heuristic analyzer (button Additionally);

    • tab Actions – actions applied to infected/suspicious objects, actions depending on threat type (button Select actions);

    • tab Exclusion area – list of objects excluded from scan (using a mask or threat name).

      Click OK when the configuration is complete.

  6. Click Next. You can then configure an exclusion area for the Real-Time protection task by clicking Add. This is a global exclusion area for all scan areas. Click Next;

  7. Click Finish to complete creation of the policy.
Was this information helpful?
Yes No
Thank you


Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.


How can we improve this article?

We will not be able to contact you if you leave your email address or phone number. To contact technical support, please sign in to your Personal Account.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.