Create a policy
This section contains instructions on how to start the New Policy Wizard to create a policy.
Create a policy from the folder of an administration group
- Start Kaspersky Security Center Administration Console.
- Expand the Administration Server <Server name> node.
- In the console tree, click Managed devices.
- Select the administration group that contains the required client computer.
- In the workspace, select the Policies tab and click New policy.
The New Policy Wizard opens.
- Follow the steps of the New Policy Wizard to create a policy.
Create a policy from the Policies folder
- Start Kaspersky Security Center Administration Console.
- Expand the Administration Server <Server name> node.
- In the console tree, click Policies.
- In the workspace, click New policy.
The New Policy Wizard opens.
- Follow the steps of the New Policy Wizard to create a policy.
To proceed to the next step of the wizard, click Next. To return to the previous step of the wizard, click . To exit the wizard at any step, click Cancel.
Note: The appearance of the buttons may vary depending on your version of Windows.
Step 1. Select an application
In the Select the application for which you want to create a group policy window, in the list of applications, select Kaspersky Endpoint Security 11 for Mac.
Step 2. Specify the name of the policy
- In the Enter a group policy name window, in the Name field, specify the name of the policy that you are creating. The name can't contain the following symbols:
“ * < : > ? \ |
. - Select the Use policy settings for an earlier version of the application checkbox if you want to import the settings from an existing Kaspersky Endpoint Security policy to a new policy.
Step 3. Specify protection settings
In the Protection window, configure the following settings if necessary:
- Configure protection settings for the operating system on the client computer.
- Configure Trusted zone.
You can create a list of objects that Kaspersky Endpoint Security does not scan or monitor.
- Configure Trusted applications.
You can create a list of applications whose network activity will not be monitored by Kaspersky Endpoint Security.
- Select types of objects to be detected.
- Disable or enable the start of scheduled tasks when the computer is running on battery power.
Step 4. Configure File Threat Protection settings
In the File Threat Protection window, do the following if necessary:
- Enable or disable File Threat Protection.
By default, File Threat Protection is enabled.
- Select a security level.
By default, the security level recommended by Kaspersky is selected.
- Configure File Threat Protection settings.
- Select the action to be performed upon detecting a malicious object.
Step 5. Configure Web Threat Protection settings
In the Web Threat Protection window, do the following if necessary:
- Enable or disable Web Threat Protection.
By default, Web Threat Protection is enabled.
- Select a security level.
By default, the security level recommended by Kaspersky is selected.
- Configure Web Threat Protection settings.
- Select the action to be performed upon detecting a malicious object in web traffic.
Step 6. Configure Network Threat Protection settings
In the Network Threat Protection window, do the following if necessary:
Step 7. Configure update settings
In the Update window, do the following if necessary:
- Enable or disable updating of application modules.
- Specify update sources.
Step 8. Configure KSN settings
In the KSN window, do the following if necessary:
- Read the full text of the Kaspersky Security Network Statement by clicking the KSN Statement button.
- View information about KSN infrastructure provided by Kaspersky Security Center.
- Enable or disable the use of Kaspersky Security Network.
- Enable or disable extended KSN mode.
- Enable or disable the use of a KSN proxy.
- Enable or disable the use of Kaspersky servers when the KSN proxy is unavailable.
Note: Use of Kaspersky Security Network and a KSN proxy on remote computers is available only if Kaspersky Security Center Administration Server is used as the proxy server. For detailed information about Administration Server properties, see the Kaspersky Security Center help.
When Global KSN infrastructure is used by Kaspersky Security Center and you choose to participate in Kaspersky Security Network in policy settings, Kaspersky Endpoint Security statistics from client computers to which the policy is applied are automatically sent to Kaspersky to enhance protection of these computers.
Note: Kaspersky doesn't receive, process, or store any personal data without your explicit consent.
When Private KSN infrastructure is used by Kaspersky Security Center and you choose to participate in Kaspersky Security Network in policy settings, Kaspersky Endpoint Security doesn't send statistics from client computers to which the policy is applied to Kaspersky.
After a policy is deleted or made inactive, KSN settings on a client computer return to the initial state.
Step 9. Configure user interaction settings
In the User Interaction window, configure the Kaspersky Endpoint Security settings for interaction with the user of the client computer if necessary.
Step 10. Configure network connection settings
In the Network window, do the following if necessary:
Step 11. Configure Reports and Backup settings
In the Reports and Backup window, do the following if necessary:
- Configure settings for generating and storing reports.
- Configure settings for storing objects in Backup.
Step 12. Configure FileVault Disk Encryption
In the FileVault Disk Encryption window, do the following if necessary:
If the Enable FileVault disk encryption management checkbox is unselected, users with administrator rights can encrypt and decrypt their Mac startup disks from System Preferences.
If the Enable FileVault disk encryption management checkbox and the Encrypt disk option are selected, users with administrator rights can't decrypt the startup disk of their Mac from System Preferences.
If the Enable FileVault disk encryption management checkbox and the Decrypt disk option are selected, users with administrator rights can't encrypt the startup disk of their Mac from System Preferences.
Step 13. Configure Web Control
In the Web Control window, do the following if necessary:
- Enable or disable Web Control.
Note: If you enable Web Control to block access to dangerous web resources, Kaspersky Endpoint Security displays the Web Control is enabled notification in Protection Center on the remote computer.
Kaspersky Endpoint Security displays notifications when the user accesses web resources blocked by Web Control on the remote computer if the Check secure connections (HTTPS) checkbox is selected in the Network window of the New policy Wizard.
- Add a new rule for Web Control by clicking Add.
You can enter a rule name, choose whether the rule is active, specify a rule area by creating a list of specific web addresses or selecting website categories, and select an action that Kaspersky Endpoint Security performs when a user accesses a website included in this rule.
- Edit, delete, or organize created rules in the list.
The order in which the rules are sorted determines the priority of their application by Kaspersky Endpoint Security.
Step 14. Define the administration group to which the policy will be applied
In the Target group window, click Browse to select an administration group to which you want to apply the policy.
Step 15. Select the policy status and complete the creation of a policy
In the Create the group policy for the application window, do the following:
- Select the status that will be assigned to the policy:
- Active policy: the policy is applied to the selected administration group.
- Inactive policy: the policy is not applied.
- Out-of-office policy: the policy is applied to the selected administration group when the computers are disconnected from the corporate network.
Note: You can create multiple policies for an application in an administration group, but only one of them can be active.
For detailed information about policy statuses, see the Kaspersky Security Center help.
- Select the Open policy properties immediately after they are created checkbox if you want to review the policy settings after the policy is created.
- Click Finish to close the New Policy Wizard.
The policy that you have created appears on the Policies tab in the workspace of the relevant administration group. The policy is applied to client computers after their first synchronization with Administration Server.
You can edit the settings of the policy you have created. You can also prohibit or allow changes to each group of settings from a client computer using the and buttons for each group of settings. The button next to a group of settings signifies that the user of a client computer is not allowed to edit these settings on the user's computer. The button next to a group of settings signifies that the user of a client computer is allowed to edit these settings on the user's computer.
Page top