Creating a policy

To create a policy:

  1. Open the Administration Console of Kaspersky Security Center.
  2. Do one of the following:
    • Select the Managed devices folder in the console tree to create a policy for all devices managed by Kaspersky Security Center.
    • In the Managed devices folder of the console tree, select the folder with the name of the administration group to which the relevant devices belong.
  3. In the workspace, select the Policies tab.
  4. Start the New Policy Wizard in one of the following ways:
    • Click the New policy button.
    • Right-click to open the context menu for the list of policies and select NewPolicy.
  5. Select Kaspersky Endpoint Security 11.2.0 for Linux.

    Proceed to the next step of the wizard.

  6. Enter a name for the policy being created.

    Proceed to the next step of the wizard.

  7. To use the settings from the previous version of Kaspersky Endpoint Security policy in the policy being created, select the Use policy settings for the earlier application version check box.

    Proceed to the next step of the wizard.

  8. Decide if you want to participate in Kaspersky Security Network. Carefully read the Kaspersky Security Network Statement and do one of the following:
    • If you agree with all the terms and conditions of the Statement and want the application to use Kaspersky Security Network, select I confirm that I have fully read, understand, and accept the terms and conditions of Kaspersky Security Network Statement.
    • If you do not want to participate in Kaspersky Security Network, select I do not agree to use Kaspersky Security Network and confirm your decision in the window that opens.

    If necessary, you can change your decision whether to participate in Kaspersky Security Network later.

    Proceed to the next step of the wizard.

  9. If necessary, configure the File Threat Protection settings.

    Proceed to the next step of the wizard.

  10. If necessary, modify the default scan settings.

    Proceed to the next step of the wizard.

  11. If necessary, configure exclusion areas.

    Proceed to the next step of the wizard.

  12. If necessary, modify the default actions for infected objects.

    Proceed to the next step of the wizard.

  13. Complete the New Policy Wizard.

Page top