The scenario for deployment and installation of program components is determined by the planned load on the program servers.
Kaspersky Endpoint Agent can be installed on any computers that belong to the organization’s IT infrastructure and run the Windows operating system. Outbound connections from computers with Kaspersky Endpoint Agent to the server hosting the Central Node component must be allowed directly, without a proxy server.
You can install one or multiple Central Node components. If you install multiple Central Node components, you can use them independently of each other or combine them for centralized management in distributed solution mode.
The deployment scenario selection depends on the utilized program functionality. All scenarios listed in this manual also apply to the deployment of the program on a virtual platform.
Full functionality (KATA and KEDR)
When using KATA and KEDR functionality, you can scan network traffic, mail traffic, and data on corporate LAN computers.
If more than 5000 Kaspersky Endpoint Agent programs are installed within the organization, it is not recommended to use the Central Node component to process traffic.
You can use the Sensor component as a proxy server for connecting hosts to Kaspersky Endpoint Agent and the Central Node. One Sensor component supports the connection of up to 1000 Kaspersky Endpoint Agent hosts.
The criteria for selecting a deployment scenario when using KATA and KEDR functionality are presented in the table below. The selection algorithm is as follows:
If a row contains two cells with identical values, you must select the cell on the left.
Selecting a deployment scenario when using KATA and KEDR functionality
Criterion |
Two-server scenario |
Three-server scenario |
Four- or more server scenario |
|
---|---|---|---|---|
Network traffic and mail traffic cannot be received on the same device. |
No |
Yes |
Yes |
Yes |
Number of Kaspersky Endpoint Agent hosts |
No |
From 5000 to 10000 |
From 5000 to 10000 |
Over 10000 |
1 Gbps |
From 1 to 2 Gbps |
Over 2 Gbps |
Over 2 Gbps |
|
The number of remote infrastructures in which traffic needs to be analyzed. |
No |
One |
Two or more |
Two or more |
The capacities of one Sandbox component are insufficient to analyze all objects within acceptable time frames. |
No |
No |
Yes |
Yes |
In distributed solution mode each program component must meet the hardware requirements specified in the sizing calculator.
Processing of network traffic, mail traffic, and web traffic (KATA)
It is recommended to use KATA functionality if the organization does not need to process data on corporate LAN computers. If this is the case, only network traffic and mail traffic are processed.
The criteria for selecting a deployment scenario when using KATA functionality are presented in the table below. The selection algorithm is as follows:
If a row contains two cells with identical values, you must select the cell on the left.
Selecting a deployment scenario when using KATA functionality
Criterion |
Two-server scenario |
Three-server scenario |
Four- or more server scenario |
---|---|---|---|
Network traffic and mail traffic cannot be received on the same device. |
No |
Yes |
Yes |
1 Gbps |
From 1 to 2 Gbps |
Over 2 Gbps |
|
The number of remote infrastructures in which traffic needs to be analyzed. |
No |
One |
Two or more |
The capacities of one Sandbox component are insufficient to analyze all objects within acceptable time frames. |
No |
No |
Yes |
Processing of data from corporate LAN computers (KEDR)
It is recommended to use KEDR functionality if the organization does not need to process traffic. If this is the case, only data on corporate LAN computers is processed.
Depending on the presence of a third-party Sandbox solution within the organization, you can use one of the following deployment scenarios: