Kaspersky Embedded Systems Security 3.4 for Windows
- About Kaspersky Embedded Systems Security for Windows
- What's new
- Sources of information about Kaspersky Embedded Systems Security for Windows
- Kaspersky Embedded Systems Security for Windows
- Installing and removing the application
- About Kaspersky Embedded Systems Security for Windows update
- Migrating settings values of the updated application version
- About Kaspersky Embedded Systems Security for Windows Administration Tools update
- Kaspersky Embedded Systems Security for Windows software component codes for the Windows Installer service
- System changes after Kaspersky Embedded Systems Security for Windows installation
- Kaspersky Embedded Systems Security for Windows processes
- Installation and recovery settings, and Windows Installer command-line options
- Kaspersky Embedded Systems Security for Windows install and uninstall logs
- Installation planning
- Installing and uninstalling the application using a wizard
- Installing using the Setup Wizard
- Modifying the set of components and repairing Kaspersky Embedded Systems Security for Windows
- Uninstalling using the Setup Wizard
- Installing and uninstalling the application from the command line
- About installing and uninstalling Kaspersky Embedded Systems Security for Windows from command line
- Example commands for installing Kaspersky Embedded Systems Security for Windows
- Actions to perform after Kaspersky Embedded Systems Security for Windows installation
- Adding / removing components. Sample commands
- Kaspersky Embedded Systems Security for Windows uninstallation. Sample commands
- Return codes
- Installing and uninstalling the application using Kaspersky Security Center
- General information about installing via Kaspersky Security Center
- Rights to install or uninstall Kaspersky Embedded Systems Security for Windows
- Installing Kaspersky Embedded Systems Security for Windows via Kaspersky Security Center
- Actions to perform after Kaspersky Embedded Systems Security for Windows installation
- Installing the Application Console via Kaspersky Security Center
- Uninstalling Kaspersky Embedded Systems Security for Windows via Kaspersky Security Center
- Installing and uninstalling via Active Directory group policies
- Checking Kaspersky Embedded Systems Security for Windows functions. Using the EICAR test virus
- Application interface
- Application licensing
- About the End User License Agreement
- About the license
- About license certificate
- About the key
- About the key file
- About activation code
- About data provision
- Activating the application with a key file
- Activating the application with an activation code
- Viewing information about current license
- Functional limitations when the license expires
- Renewing license
- Deleting the key
- Working with the Administration Plug-in
- Managing Kaspersky Embedded Systems Security for Windows from Kaspersky Security Center
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- About task creation in Kaspersky Security Center
- Creating a task using Kaspersky Security Center
- Going to the local task settings and general application settings for an individual computer
- Configuring group tasks in Kaspersky Security Center
- Configuring crash diagnostics settings in Kaspersky Security Center
- Managing task schedules
- Reports in Kaspersky Security Center
- Working with the Kaspersky Embedded Systems Security for Windows Console
- About the Kaspersky Embedded Systems Security for Windows Console
- Kaspersky Embedded Systems Security for Windows Console interface
- Managing Kaspersky Embedded Systems Security for Windows via the Application Console on another device
- Configuring general application settings via the Application Console
- Managing Kaspersky Embedded Systems Security for Windows tasks
- Viewing protection status and Kaspersky Embedded Systems Security for Windows information
- Working with the Web Plug-in from Web Console and Cloud Console
- Managing Kaspersky Embedded Systems Security for Windows from Web Console and Cloud Console
- Web Plug-in limitations
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- Reports in Kaspersky Security Center
- Compact Diagnostic Interface
- Kaspersky Embedded Systems Security for Windows database and software modules update
- About Update tasks
- About Software Modules Update
- About Database Update
- Kaspersky Embedded Systems Security for Windows database and software modules updating schemes
- Configuring Update tasks
- Rolling back Kaspersky Embedded Systems Security for Windows database updates
- Rolling back application module updates
- Update task statistics
- Isolating objects and copying backups
- Isolating probably infected objects. Quarantine
- Making backup copies of objects. Backup
- Blocking access to network resources. Blocked network sessions
- Event registration. Kaspersky Embedded Systems Security for Windows logs
- Ways to register Kaspersky Embedded Systems Security for Windows events
- System audit log
- Task logs
- Security log
- Viewing the event log of Kaspersky Embedded Systems Security for Windows in Event Viewer
- Configuring log settings via the Application Console
- Configuring logs and notifications settings via the Administration Plug-in
- Notification settings
- Starting and stopping Kaspersky Embedded Systems Security for Windows
- Starting the Kaspersky Embedded Systems Security for Windows Administration Plug-in
- Starting the Kaspersky Embedded Systems Security for Windows Console from the Start menu
- Starting and stopping the Kaspersky Security Service
- Starting Kaspersky Embedded Systems Security for Windows components in the operating system safe mode
- Kaspersky Embedded Systems Security for Windows self-defense
- About Kaspersky Embedded Systems Security for Windows self-defense
- Protection from changes to folders with installed Kaspersky Embedded Systems Security for Windows components
- Protection from changes to Kaspersky Embedded Systems Security for Windows registry keys
- Registering Kaspersky Security as a protected service
- Managing access permissions for Kaspersky Embedded Systems Security for Windows functions
- About permissions to manage Kaspersky Embedded Systems Security for Windows
- About permissions to manage registered services
- About access permissions for the Kaspersky Security Management Service
- About permissions to manage the Kaspersky Security Service
- Managing access permissions via the Administration Plug-in
- Managing access permissions via the Application Console
- Managing access permissions via the Web Plug-in
- Real-Time File Protection
- About the Real-Time File Protection task
- About the task protection scope and security settings
- About virtual protection scopes
- Predefined protection scopes
- About predefined security levels
- File extensions scanned by default in the Real-Time File Protection task
- Default Real-Time File Protection task settings
- Managing the Real-Time File Protection task via the Administration Plug-in
- Managing the Real-Time File Protection task via the Application Console
- Managing Real-Time File Protection task via the Web Plug-in
- KSN Usage
- Network Threat Protection
- About the Network Threat Protection task
- Default Network Threat Protection task settings
- Configuring the Network Threat Protection task via the Application Console
- Configuring the Network Threat Protection task via the Administration Plug-in
- Configuring the Network Threat Protection task via the Web Plug-in
- Applications Launch Control
- About the Applications Launch Control task
- About Applications Launch Control rules
- About Software Distribution Control
- About KSN usage for the Applications Launch Control task
- About the Rule Generator for Applications Launch Control
- Default Applications Launch Control task settings
- Managing Applications Launch Control via the Administration Plug-in
- Navigation
- Configuring Applications Launch Control task settings
- Configuring Software Distribution Control
- Configuring a Rule Generator for Applications Launch Control task
- Configuring Applications Launch Control rules via the Kaspersky Security Center
- Adding an Applications Launch Control rule
- Enabling the Default Allow mode
- Creating allowing rules for applications launch control from Kaspersky Security Center events
- Importing rules from a Kaspersky Security Center report on blocked applications
- Importing Applications Launch Control rules from an XML file
- Checking application launches
- Creating a Rule Generator for Applications Launch Control task
- Managing Applications Launch Control via the Application Console
- Managing Applications Launch Control via the Web Plug-in
- Device Control
- About Device Control task
- About Device Control rules
- Default Device Control task settings
- Managing Device Control via the Administration Plug-in
- Managing Device Control via the Application Console
- Managing Device Control via the Web Plug-in
- Firewall Management
- About the Firewall Management task
- About Firewall rules
- Default Firewall Management task settings
- Configuring the Firewall Management task using the Administration Plug-in
- Configuring the Firewall Management task using the Application Console
- Configuring the Firewall Management task using the Web Plug-in
- File Integrity Monitor
- AMSI Scanner
- Registry Access Monitor
- About the Registry Access Monitor task
- About the registry access monitoring rules
- Default Registry Access Monitor task settings
- Managing the Registry Access Monitor via the Administration Plug-in
- Managing the Registry Access Monitor task via the Application Console
- Managing the Registry Access Monitor via the Web Plug-in
- Log Inspection
- On-Demand Scan
- About On-Demand Scan tasks
- About the task scan scope and security settings
- Predefined scan scopes
- Online storage file scanning
- About predefined security levels
- Removable Drives Scan
- About the Baseline File Integrity Monitor task
- Enabling start of On-Demand Scan task from context menu
- Default On-Demand Scan tasks settings
- Managing On-Demand Scan tasks via the Administration Plug-in
- Managing On-Demand Scan tasks via the Application Console
- Managing On-Demand Scan tasks via the Web Plug-in
- Trusted zone
- Exploit Prevention
- Integrating with third-party systems
- Performance counters for System Monitor
- About Kaspersky Embedded Systems Security for Windows performance counters
- Total number of requests denied
- Total number of requests skipped
- Number of requests not processed because of lack of system resources
- Number of requests sent to be processed
- Average number of file interception dispatcher streams
- Maximum number of file interception dispatcher streams
- Number of elements in the infected objects queue
- Number of objects processed per second
- Kaspersky Embedded Systems Security for Windows SNMP counters and traps
- About Kaspersky Embedded Systems Security for Windows SNMP counters and traps
- Kaspersky Embedded Systems Security for Windows SNMP counters
- Kaspersky Embedded Systems Security for Windows SNMP traps and their options
- Kaspersky Embedded Systems Security for Windows SNMP traps options descriptions and possible values
- Integrating with WMI
- Performance counters for System Monitor
- Working with Kaspersky Embedded Systems Security for Windows from the command line
- Commands
- Displaying command help for Kaspersky Embedded Systems Security for Windows. KAVSHELL HELP
- Starting and stopping the Kaspersky Security Service: KAVSHELL START, KAVSHELL STOP
- Scanning a specified scope: KAVSHELL SCAN
- Starting the Critical Areas Scan task: KAVSHELL SCANCRITICAL
- Managing tasks asynchronously: KAVSHELL TASK
- Removing the PPL attribute: KAVSHELL CONFIG
- Starting and stopping Real-Time Computer Protection tasks. KAVSHELL RTP
- Managing the Applications Launch Control task: KAVSHELL APPCONTROL /CONFIG
- Rule Generator for Applications Launch Control: KAVSHELL APPCONTROL /GENERATE
- Filling the list of Applications Launch Control rules. KAVSHELL APPCONTROL
- Filling the list of Device Control rules. KAVSHELL DEVCONTROL
- Starting the Database Update task: KAVSHELL UPDATE
- Rolling back Kaspersky Embedded Systems Security for Windows database updates: KAVSHELL ROLLBACK
- Managing Log Inspection: KAVSHELL TASK LOG-INSPECTOR
- Activation of Application. KAVSHELL LICENSE
- Enabling, configuring, and disabling trace logs. KAVSHELL TRACE
- Kaspersky Embedded Systems Security for Windows log files defragmentation. KAVSHELL VACUUM
- Cleaning iSwift base. KAVSHELL FBRESET
- Enabling and disabling dump file creation. KAVSHELL DUMP
- Importing settings. KAVSHELL IMPORT
- Exporting settings. KAVSHELL EXPORT
- Integration with Microsoft Operations Management Suite. KAVSHELL OMSINFO
- Managing the Baseline File Integrity Monitor task: KAVSHELL FIM /BASELINE
- Command return codes
- Return code for the KAVSHELL START and KAVSHELL STOP commands
- Return code for KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands
- Return code for the KAVSHELL TASK LOG-INSPECTOR command
- Return codes for the KAVSHELL TASK command
- Return codes for the KAVSHELL RTP command
- Return codes for the KAVSHELL UPDATE command
- Return codes for the KAVSHELL ROLLBACK command
- Return codes for the KAVSHELL LICENSE command
- Return codes for the KAVSHELL TRACE command
- Return codes for the KAVSHELL FBRESET command
- Return codes for the KAVSHELL DUMP command
- Return codes for the KAVSHELL IMPORT command
- Return codes for the KAVSHELL EXPORT command
- Return codes for the KAVSHELL FIM /BASELINE command
- Commands
- Contacting Technical Support
- Glossary
- Active key
- Administration Server
- Anti-virus databases
- Archive
- Backup
- Disinfection
- Event importance
- False positive
- File mask
- Heuristic analyzer
- Infectable file
- Infected object
- Kaspersky Security Network (KSN)
- License term
- Local task
- OLE object
- Policy
- Protection state
- Quarantine
- Security level
- SIEM
- Startup objects
- Task
- Task settings
- Update
- Vulnerability
- Information about third-party code
- Trademark notices
About Applications Launch Control rules
How Applications Launch Control rules work
The operation of Applications Launch Control rules is based on the following components:
- Type of rule.
Applications Launch Control rules can allow or deny the start of application. Accordingly, they are called allowing or denying rules. To create a list of allowing rules for Applications Launch Control, you can use the Rule Generator for generating allowing rules or use the Applications Launch Control task in Statistics only mode. You can also add allowing rules manually.
- User or group of users.
Applications Launch Control rules can control the start of specified applications by a user and / or user group.
- Rule usage scope.
Applications Launch Control rules can be applied to executable files, scripts, and MSI packages.
- Rule triggering criterion.
Applications Launch Control rules control the launch of files that satisfy one or several of the criteria specified in the rule settings: signed by the specified digital certificate, matching the specified SHA256 hash, located at the specified path, and matching the specified command line arguments. You should select at least one option. Otherwise, the Application Launch Control rule is not added.
If Digital certificate is set as the rule triggering criterion, the created rule controls the start of all trusted applications in the operating system. You can set stricter conditions for this criterion by selecting the following check boxes:
- Use subject
The check box either enables or disables the use of the subject of the digital certificate as a rule triggering criterion.
If the check box is selected, the specified digital certificate subject is used as a rule triggering criterion. The created rule will control the start of applications only for the vendor specified in the subject.
If the check box is cleared, the application will not use the subject of the digital certificate as a rule triggering criterion. If the Digital certificate criterion is selected, the created rule will control the start of applications signed with a digital certificate containing any subject.
The subject of the digital certificate used to sign the file can be specified only from the properties of the selected file using the Set rule triggering criterion from file properties button located above the Rule triggering criterion block.
By default, the check box is cleared.
- Use thumb
The check box enables / disables the use of the thumbprint of the digital certificate as a rule triggering criterion.
If the check box is selected, the specified digital certificate thumbprint is used as a rule triggering criterion. The created rule will control the start of applications signed with a digital certificate with the specified thumbprint.
If the check box is cleared, the application will not use the thumbprint of the digital certificate as a rule triggering criterion. If the Digital certificate criterion is selected, the application will control the start of applications signed with a digital certificate with any thumbprint.
The thumbprint of the digital certificate used to sign the file can be specified only from the properties of the selected file using the Set rule triggering criterion from file properties button located above the Rule triggering criterion block.
By default, the check box is cleared.
Thumbprints allow for the most restrictive triggering of application start rules based on a digital certificate, because a thumbprint uniquely identifies a digital certificate and cannot be forged, unlike the subject of a digital certificate.
You can specify exclusions for Applications Launch Control rules. Exclusions to Applications Launch Control rules are based on the same criteria used to trigger rules: digital certificate, SHA256 hash, and file path. Exclusions to Applications Launch Control rules may be required for certain allowing rules: for example, if you want to allow users to start applications from the C:\Windows path, while blocking launch of the Regedit.exe file.
If operating system files fall within the scope of the Applications Launch Control task, we recommend that when creating Applications Launch Control rules you make sure that such applications are allowed by the newly created rules. Otherwise, the operating system may fail to start.
Managing Applications Launch Control rules
You can perform the following actions with Applications Launch Control rules:
- Add rules manually.
- Generate and add rules automatically.
- Remove rules.
- Export rules to file.
- Check selected files for rules that allow execution of these files.
- Filter the rules in the list according to specified criterion.