Step 1. Viewing the End User License Agreement and Privacy Policy

To continue installation, please read the End User License Agreement (EULA) and accept its terms. Installation will not continue until you accept the terms of the End User License Agreement.

You also need to read the Privacy Policy and accept its terms.

To accept the terms of the End User License Agreement and Privacy Policy:

  1. Select the language for viewing the End User License Agreement and Privacy Policy in the list.

    For example, if you want to view the End User License Agreement and Privacy Policy in English, select English and press ENTER.

    This opens a window showing the End User License Agreement text.

  2. Please read the End User License Agreement.
  3. If you accept the terms of the End User License Agreement, click I accept.

    This opens a window displaying the text of the Privacy Policy.

  4. Please carefully read the Privacy Policy.
  5. If you accept the terms of the Privacy Policy, click I accept.

The Setup Wizard proceeds to the next step.

See also

Installing and configuring the Central Node and Sensor components on the same server

Step 2. Selecting a disk for installing the Central Node and Sensor components

Step 3. Selecting a server role

Step 4. Configuring the minimum password length for the administrator password

Step 5. Creating an account for working in the administrator menu and in the server management console

Step 6. Assigning the host name

Step 7. Enabling a network interface for the first time

Step 8. Assigning the address and subnet mask of the management interface

Step 9. Configuring the default network route

Step 10. Configuring DNS settings

Step 11. Configuring proxy server connection settings

Step 12. Setting the time zone

Step 13. Configuring time synchronization with an NTP server

Step 14. Configuring integration with the Sandbox component

Step 15. Allocating the disk for the Targeted Attack Analyzer component's database

Step 16. Creating an administrator account for the web interface of Kaspersky Anti Targeted Attack Platform

Step 17. Configuring receipt of mirrored traffic from SPAN ports

Step 18. Configuring integration with a proxy server via ICAP

Step 19. Configuring integration with a mail server via POP3

Step 20. Configuring integration with a mail server via SMTP

Page top