Kaspersky Endpoint Security Cloud
- Kaspersky Endpoint Security Cloud help
- What's new
- About Kaspersky Endpoint Security Cloud
- Key features of Kaspersky Endpoint Security Cloud
- About per-user licensing
- Comparison of Kaspersky Endpoint Security Cloud editions
- Comparison of Kaspersky Endpoint Security Cloud features for different Windows operating system types
- Hardware and software requirements
- Network ports used by Kaspersky Endpoint Security Cloud
- About licenses purchased before April 2019
- Quick Start Guide
- Getting started with Kaspersky Endpoint Security Cloud
- Kaspersky Endpoint Security Cloud Management Console
- Initial setup of Kaspersky Endpoint Security Cloud
- Interface of Kaspersky Endpoint Security Cloud Management Console
- Deployment of security applications
- Upgrading Kaspersky Endpoint Security Cloud
- Managing user accounts
- Managing devices
- Viewing the list of devices
- About device statuses
- Viewing the properties of a device
- Connecting Windows devices and Mac devices
- Renaming devices
- Assigning the owner of a Windows device or a Mac device
- Scenario: Creating, renewing, and uploading an APNs certificate
- Connecting mobile devices
- Sending commands to users' devices
- Deleting devices from the list of devices
- Starting and stopping anti-malware database updates and malware scans
- Updating the security application on devices running Windows and macOS
- Enabling and disabling updates of the security application on devices running Windows
- Managing security profiles
- Endpoint Detection and Response
- About Endpoint Detection and Response
- About Indicators of Compromise
- Starting the use of Endpoint Detection and Response
- Scenario: Configuring and using Endpoint Detection and Response
- Configuring IoC scans for potential threats
- Configuring execution prevention
- Viewing information about Endpoint Detection and Response alerts
- Taking manual response measures
- Canceling network isolation of a Windows device
- Exporting information about Endpoint Detection and Response alerts
- Disabling Endpoint Detection and Response
- Root-Cause Analysis
- Adaptive Anomaly Control
- Data Discovery
- About Data Discovery
- Categories of information detected by Data Discovery
- Starting the use of Data Discovery
- Connecting an Office 365 organization to your workspace
- Viewing information about Data Discovery detections
- Example of analyzing a Data Discovery detection
- Exporting information about Data Discovery detections
- Disabling Data Discovery
- Cloud Discovery
- About Cloud Discovery
- Starting the use of Cloud Discovery
- Enabling and disabling Cloud Discovery in security profiles
- Viewing information about the use of cloud services
- Risk level of a cloud service
- Blocking access to unwanted cloud services
- Enabling and disabling the monitoring of internet connections on Windows devices
- Vulnerability Assessment and Patch Management
- Encryption Management
- Performing typical tasks
- Closing a Management Console session
- Viewing widgets
- Configuring protection
- Configuring protection components on Windows devices
- Selecting the types of detectable objects on Windows devices
- Configuring the File Threat Protection component on Windows devices
- Configuring the scanning of removable drives when they are connected to a computer
- Configuring the Mail Threat Protection component on Windows devices
- Configuring the Web Threat Protection component on Windows devices
- Configuring the Behavior Detection, Exploit Prevention, and Remediation Engine components on Windows devices
- Enabling and disabling AMSI Protection
- Configuring the BadUSB Attack Prevention component
- Configuring the Network Threat Protection component on Windows devices
- Configuring network ports exclusions
- Enabling and disabling Advanced Disinfection
- Configuring protection components on Mac devices
- Trusted zone
- Configuring anti-malware protection on Android devices
- Configuring protection components on Windows devices
- Configuring the Host Intrusion Prevention component on Windows devices
- Defining proxy server settings
- Managing the startup of applications on users' devices
- Compliance control of Android devices with corporate security requirements
- Configuring user access to device features
- Controlling network and storage devices on Windows devices
- Generating a list of trusted network and storage devices on Windows devices
- Configuring interaction of Kaspersky Endpoint Security for Windows with end users
- Configuring interaction of Kaspersky Endpoint Security for Mac with end users
- Controlling user access to the features of Android devices
- Controlling user access to the features of iOS and iPadOS devices
- Device hack detection (root access)
- Configuring password protection of Windows devices
- Configuring the unlock password for mobile devices
- Configuring Firewall on Windows devices
- Configuring user access to websites
- Configuring a proxy server
- Configuring an internet connection
- Configuring email on iOS and iPadOS devices
- Configuring CalDAV Calendar on iOS and iPadOS devices
- Protecting Kaspersky Endpoint Security for Android against removal
- Configuring notifications from Kaspersky Endpoint Security for Android
- Enabling and disabling performance features of Kaspersky Endpoint Security for Windows
- Configuring performance features of Kaspersky Endpoint Security for Mac
- Enabling and disabling the transmission of dump files and trace files to Kaspersky for analysis
- Viewing license details and entering an activation code
- Leaving feedback
- Reports on device protection
- List of reports on device protection
- Protection status report
- Threats report
- Status of anti-malware database updates report
- Network attacks report
- Vulnerabilities report
- Cloud Discovery reports
- Adaptive Anomaly Control reports
- Detections by Device Control component report
- Detections by Web Control component report
- Encryption status of devices report
- Kaspersky applications versions report
- Working with reports
- Configuring regular delivery of reports by email
- List of reports on device protection
- Viewing the event log and configuring event notifications
- Adjusting the general settings of Kaspersky Endpoint Security Cloud
- Managing objects in Quarantine
- Kaspersky Security Network
- Kaspersky Business Hub
- About Kaspersky Business Hub
- Managing the list of companies on Kaspersky Business Hub
- Viewing the list of companies on Kaspersky Business Hub
- Viewing aggregated protection statistics
- Adding a new company to Kaspersky Business Hub
- Adding another workspace for a company registered on Kaspersky Business Hub
- Editing company information
- Deleting the workspace of a company
- Canceling deletion of a company workspace
- Viewing news and sending feedback
- Managing the list of licenses on Kaspersky Business Hub
- Taking cybersecurity training
- Selecting the data centers used to store Kaspersky Endpoint Security Cloud information
- Resetting your password
- Editing the settings of an account in Kaspersky Business Hub
- Quick Start Guide for Managed Service Providers (MSPs)
- Kaspersky Endpoint Security Cloud licensing
- Contact Technical Support
- Sources of information about the application
- Glossary
- Account on Kaspersky Business Hub
- Administration Server
- Anti-malware databases
- Apple Push Notification service (APNs) certificate
- Background scan
- Certificate Signing Request
- Compliance control
- Device owner
- File Threat Protection
- Host Intrusion Prevention (Application Privilege Control)
- Kaspersky Business Hub
- Kaspersky Endpoint Security Cloud Management Console
- Kaspersky Security Network (KSN)
- Mail Threat Protection
- Malicious web addresses
- Malware
- Managed device
- Network Agent
- Network Threat Protection
- Patch
- Phishing
- Proxy server
- Quarantine
- Security application
- Security profile
- Supervised device
- Trusted device
- Trusted Platform Module (TPM)
- Trusted zone
- Update importance level
- User alias
- Vulnerability
- Vulnerability severity level
- Web Threat Protection
- Windows device name
- Workspace
- Information about third-party code
- Trademark notices
Viewing the list of users
The Users section of Kaspersky Endpoint Security Cloud Management Console displays users and groups of users that have been added to the Management Console.
The list contains columns with the following details of users and their devices:
- Status. An icon reflects the protection status of the user's devices (computers and/or mobile devices that have been connected to Kaspersky Endpoint Security Cloud), in descending order of severity:
(Critical). A critical event occurred on at least one user's device.
(Warning). An important event that must be attended to occurred on at least one user's device.
(OK). No critical or important events occurred on user's devices.
(No data yet). The user owns no devices that have been connected to Kaspersky Endpoint Security Cloud or no data can be retrieved concerning the events that have occurred on such devices.
If the user owns several devices with different statuses, the most severe status is displayed. For example, if an important event and a critical event occur on different devices, the status corresponding to the critical one will be displayed.
- User / Group. This contains the user name and email address (for stand-alone users), or the group name and the number of users in the group (for groups of users). You can click the link with the name to go to the page with detailed information about the user or group of users.
- Number of devices. This contains the number of devices that are owned by the user or group of users and are connected to Kaspersky Endpoint Security Cloud.
- Comment. This contains the comment that you typed when editing the user information or adding the group of users.
- Access rights. This contains the access rights that have been granted to the user. The Admin tag means that the user has been granted administrator rights. If the user has not been granted administrator rights, this column remains blank for this user.
- Security profile. This contains the security profilethat has been assigned to the user account or group of users. If necessary, you can assign a different security profile by selecting one in the drop-down list. The security profile that you assigned is immediately applied to the user's devices.
Named collection of settings of Kaspersky applications. This collection of settings ensures security on computers and mobile devices added to Kaspersky Endpoint Security Cloud. A single profile contains the settings of all of the supported security applications. After a security profile is applied to a device that has been added to Kaspersky Endpoint Security Cloud, the settings of the Kaspersky application on the device are replaced with those specified in the profile.
You can filter the list of user accounts by status of the user's devices.
To filter the list of user accounts,
Next to Show users, click the link with the required status.
To remove the filter,
Click the All link.
You can sort the list of user accounts by column: Status, User / Group, Number of devices, Comment, or Access rights.
To sort the list,
Click the link containing the column name.
The column name is displayed in uppercase characters. Next to the name of the column, an up arrow (˄) indicates the sorting direction. To change the sorting direction, click one more time. Next to the name of the column, a down arrow (˅) appears.
The Search entry field is located above the list. You can use this field to quickly find and switch to an object in a long list.