Kaspersky Embedded Systems Security 3.4 for Windows
- About Kaspersky Embedded Systems Security for Windows
- What's new
- Sources of information about Kaspersky Embedded Systems Security for Windows
- Kaspersky Embedded Systems Security for Windows
- Installing and removing the application
- About Kaspersky Embedded Systems Security for Windows update
- Migrating settings values of the updated application version
- About Kaspersky Embedded Systems Security for Windows Administration Tools update
- Kaspersky Embedded Systems Security for Windows software component codes for the Windows Installer service
- System changes after Kaspersky Embedded Systems Security for Windows installation
- Kaspersky Embedded Systems Security for Windows processes
- Installation and recovery settings, and Windows Installer command-line options
- Kaspersky Embedded Systems Security for Windows install and uninstall logs
- Installation planning
- Installing and uninstalling the application using a wizard
- Installing using the Setup Wizard
- Modifying the set of components and repairing Kaspersky Embedded Systems Security for Windows
- Uninstalling using the Setup Wizard
- Installing and uninstalling the application from the command line
- About installing and uninstalling Kaspersky Embedded Systems Security for Windows from command line
- Example commands for installing Kaspersky Embedded Systems Security for Windows
- Actions to perform after Kaspersky Embedded Systems Security for Windows installation
- Adding / removing components. Sample commands
- Kaspersky Embedded Systems Security for Windows uninstallation. Sample commands
- Return codes
- Installing and uninstalling the application using Kaspersky Security Center
- General information about installing via Kaspersky Security Center
- Rights to install or uninstall Kaspersky Embedded Systems Security for Windows
- Installing Kaspersky Embedded Systems Security for Windows via Kaspersky Security Center
- Actions to perform after Kaspersky Embedded Systems Security for Windows installation
- Installing the Application Console via Kaspersky Security Center
- Uninstalling Kaspersky Embedded Systems Security for Windows via Kaspersky Security Center
- Installing and uninstalling via Active Directory group policies
- Checking Kaspersky Embedded Systems Security for Windows functions. Using the EICAR test virus
- Application interface
- Application licensing
- About the End User License Agreement
- About the license
- About license certificate
- About the key
- About the key file
- About activation code
- About data provision
- Activating the application with a key file
- Activating the application with an activation code
- Viewing information about current license
- Functional limitations when the license expires
- Renewing license
- Deleting the key
- Working with the Administration Plug-in
- Managing Kaspersky Embedded Systems Security for Windows from Kaspersky Security Center
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- About task creation in Kaspersky Security Center
- Creating a task using Kaspersky Security Center
- Going to the local task settings and general application settings for an individual computer
- Configuring group tasks in Kaspersky Security Center
- Configuring crash diagnostics settings in Kaspersky Security Center
- Managing task schedules
- Reports in Kaspersky Security Center
- Working with the Kaspersky Embedded Systems Security for Windows Console
- About the Kaspersky Embedded Systems Security for Windows Console
- Kaspersky Embedded Systems Security for Windows Console interface
- Managing Kaspersky Embedded Systems Security for Windows via the Application Console on another device
- Configuring general application settings via the Application Console
- Managing Kaspersky Embedded Systems Security for Windows tasks
- Viewing protection status and Kaspersky Embedded Systems Security for Windows information
- Working with the Web Plug-in from Web Console and Cloud Console
- Managing Kaspersky Embedded Systems Security for Windows from Web Console and Cloud Console
- Web Plug-in limitations
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- Reports in Kaspersky Security Center
- Compact Diagnostic Interface
- Kaspersky Embedded Systems Security for Windows database and software modules update
- About Update tasks
- About Software Modules Update
- About Database Update
- Kaspersky Embedded Systems Security for Windows database and software modules updating schemes
- Configuring Update tasks
- Rolling back Kaspersky Embedded Systems Security for Windows database updates
- Rolling back application module updates
- Update task statistics
- Isolating objects and copying backups
- Isolating probably infected objects. Quarantine
- Making backup copies of objects. Backup
- Blocking access to network resources. Blocked network sessions
- Event registration. Kaspersky Embedded Systems Security for Windows logs
- Ways to register Kaspersky Embedded Systems Security for Windows events
- System audit log
- Task logs
- Security log
- Viewing the event log of Kaspersky Embedded Systems Security for Windows in Event Viewer
- Configuring log settings via the Application Console
- Configuring logs and notifications settings via the Administration Plug-in
- Notification settings
- Starting and stopping Kaspersky Embedded Systems Security for Windows
- Starting the Kaspersky Embedded Systems Security for Windows Administration Plug-in
- Starting the Kaspersky Embedded Systems Security for Windows Console from the Start menu
- Starting and stopping the Kaspersky Security Service
- Starting Kaspersky Embedded Systems Security for Windows components in the operating system safe mode
- Kaspersky Embedded Systems Security for Windows self-defense
- About Kaspersky Embedded Systems Security for Windows self-defense
- Protection from changes to folders with installed Kaspersky Embedded Systems Security for Windows components
- Protection from changes to Kaspersky Embedded Systems Security for Windows registry keys
- Registering Kaspersky Security as a protected service
- Managing access permissions for Kaspersky Embedded Systems Security for Windows functions
- About permissions to manage Kaspersky Embedded Systems Security for Windows
- About permissions to manage registered services
- About access permissions for the Kaspersky Security Management Service
- About permissions to manage the Kaspersky Security Service
- Managing access permissions via the Administration Plug-in
- Managing access permissions via the Application Console
- Managing access permissions via the Web Plug-in
- Real-Time File Protection
- About the Real-Time File Protection task
- About the task protection scope and security settings
- About virtual protection scopes
- Predefined protection scopes
- About predefined security levels
- File extensions scanned by default in the Real-Time File Protection task
- Default Real-Time File Protection task settings
- Managing the Real-Time File Protection task via the Administration Plug-in
- Managing the Real-Time File Protection task via the Application Console
- Managing Real-Time File Protection task via the Web Plug-in
- KSN Usage
- Network Threat Protection
- About the Network Threat Protection task
- Default Network Threat Protection task settings
- Configuring the Network Threat Protection task via the Application Console
- Configuring the Network Threat Protection task via the Administration Plug-in
- Configuring the Network Threat Protection task via the Web Plug-in
- Applications Launch Control
- About the Applications Launch Control task
- About Applications Launch Control rules
- About Software Distribution Control
- About KSN usage for the Applications Launch Control task
- About the Rule Generator for Applications Launch Control
- Default Applications Launch Control task settings
- Managing Applications Launch Control via the Administration Plug-in
- Navigation
- Configuring Applications Launch Control task settings
- Configuring Software Distribution Control
- Configuring a Rule Generator for Applications Launch Control task
- Configuring Applications Launch Control rules via the Kaspersky Security Center
- Adding an Applications Launch Control rule
- Enabling the Default Allow mode
- Creating allowing rules for applications launch control from Kaspersky Security Center events
- Importing rules from a Kaspersky Security Center report on blocked applications
- Importing Applications Launch Control rules from an XML file
- Checking application launches
- Creating a Rule Generator for Applications Launch Control task
- Managing Applications Launch Control via the Application Console
- Managing Applications Launch Control via the Web Plug-in
- Device Control
- About Device Control task
- About Device Control rules
- Default Device Control task settings
- Managing Device Control via the Administration Plug-in
- Managing Device Control via the Application Console
- Managing Device Control via the Web Plug-in
- Firewall Management
- About the Firewall Management task
- About Firewall rules
- Default Firewall Management task settings
- Configuring the Firewall Management task using the Administration Plug-in
- Configuring the Firewall Management task using the Application Console
- Configuring the Firewall Management task using the Web Plug-in
- File Integrity Monitor
- AMSI Scanner
- Registry Access Monitor
- About the Registry Access Monitor task
- About the registry access monitoring rules
- Default Registry Access Monitor task settings
- Managing the Registry Access Monitor via the Administration Plug-in
- Managing the Registry Access Monitor task via the Application Console
- Managing the Registry Access Monitor via the Web Plug-in
- Log Inspection
- On-Demand Scan
- About On-Demand Scan tasks
- About the task scan scope and security settings
- Predefined scan scopes
- Online storage file scanning
- About predefined security levels
- Removable Drives Scan
- About the Baseline File Integrity Monitor task
- Enabling start of On-Demand Scan task from context menu
- Default On-Demand Scan tasks settings
- Managing On-Demand Scan tasks via the Administration Plug-in
- Managing On-Demand Scan tasks via the Application Console
- Managing On-Demand Scan tasks via the Web Plug-in
- Trusted zone
- Exploit Prevention
- Integrating with third-party systems
- Performance counters for System Monitor
- About Kaspersky Embedded Systems Security for Windows performance counters
- Total number of requests denied
- Total number of requests skipped
- Number of requests not processed because of lack of system resources
- Number of requests sent to be processed
- Average number of file interception dispatcher streams
- Maximum number of file interception dispatcher streams
- Number of elements in the infected objects queue
- Number of objects processed per second
- Kaspersky Embedded Systems Security for Windows SNMP counters and traps
- About Kaspersky Embedded Systems Security for Windows SNMP counters and traps
- Kaspersky Embedded Systems Security for Windows SNMP counters
- Kaspersky Embedded Systems Security for Windows SNMP traps and their options
- Kaspersky Embedded Systems Security for Windows SNMP traps options descriptions and possible values
- Integrating with WMI
- Performance counters for System Monitor
- Working with Kaspersky Embedded Systems Security for Windows from the command line
- Commands
- Displaying command help for Kaspersky Embedded Systems Security for Windows. KAVSHELL HELP
- Starting and stopping the Kaspersky Security Service: KAVSHELL START, KAVSHELL STOP
- Scanning a specified scope: KAVSHELL SCAN
- Starting the Critical Areas Scan task: KAVSHELL SCANCRITICAL
- Managing tasks asynchronously: KAVSHELL TASK
- Removing the PPL attribute: KAVSHELL CONFIG
- Starting and stopping Real-Time Computer Protection tasks. KAVSHELL RTP
- Managing the Applications Launch Control task: KAVSHELL APPCONTROL /CONFIG
- Rule Generator for Applications Launch Control: KAVSHELL APPCONTROL /GENERATE
- Filling the list of Applications Launch Control rules. KAVSHELL APPCONTROL
- Filling the list of Device Control rules. KAVSHELL DEVCONTROL
- Starting the Database Update task: KAVSHELL UPDATE
- Rolling back Kaspersky Embedded Systems Security for Windows database updates: KAVSHELL ROLLBACK
- Managing Log Inspection: KAVSHELL TASK LOG-INSPECTOR
- Activation of Application. KAVSHELL LICENSE
- Enabling, configuring, and disabling trace logs. KAVSHELL TRACE
- Kaspersky Embedded Systems Security for Windows log files defragmentation. KAVSHELL VACUUM
- Cleaning iSwift base. KAVSHELL FBRESET
- Enabling and disabling dump file creation. KAVSHELL DUMP
- Importing settings. KAVSHELL IMPORT
- Exporting settings. KAVSHELL EXPORT
- Integration with Microsoft Operations Management Suite. KAVSHELL OMSINFO
- Managing the Baseline File Integrity Monitor task: KAVSHELL FIM /BASELINE
- Command return codes
- Return code for the KAVSHELL START and KAVSHELL STOP commands
- Return code for KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands
- Return code for the KAVSHELL TASK LOG-INSPECTOR command
- Return codes for the KAVSHELL TASK command
- Return codes for the KAVSHELL RTP command
- Return codes for the KAVSHELL UPDATE command
- Return codes for the KAVSHELL ROLLBACK command
- Return codes for the KAVSHELL LICENSE command
- Return codes for the KAVSHELL TRACE command
- Return codes for the KAVSHELL FBRESET command
- Return codes for the KAVSHELL DUMP command
- Return codes for the KAVSHELL IMPORT command
- Return codes for the KAVSHELL EXPORT command
- Return codes for the KAVSHELL FIM /BASELINE command
- Commands
- Contacting Technical Support
- Glossary
- Active key
- Administration Server
- Anti-virus databases
- Archive
- Backup
- Disinfection
- Event importance
- False positive
- File mask
- Heuristic analyzer
- Infectable file
- Infected object
- Kaspersky Security Network (KSN)
- License term
- Local task
- OLE object
- Policy
- Protection state
- Quarantine
- Security level
- SIEM
- Startup objects
- Task
- Task settings
- Update
- Vulnerability
- Information about third-party code
- Trademark notices
Adding an Applications Launch Control rule
To add an Applications Launch Control rule using the Application Console:
- Open the Applications Launch Control rules window.
- Click the Add button.
- In the context menu of the button, select Add one rule.
The Rule settings window opens.
- Specify the following settings:
- In the Name field, enter the name of the rule.
- In the Type drop-down list, select the rule type:
- Allowing, if you want the rule to allow launch of applications in accordance with the criteria specified in the rule settings.
- Denying, if you want the rule to block launch of applications in accordance with the criteria specified in the rule settings.
- In the Scope drop-down list, select the type of files whose execution will be controlled by the rule:
- Executable files, if you want the rule to control launch of executable files.
- Scripts and MSI packages, if you want the rule to control launch of scripts and MSI packages.
- In the User or user group field, specify the users who will or will not be allowed to start programs based on the type of rule.
- In the context menu of the Browse button, select the method for adding trusted users.
The User or user group selection window opens.
- Select a user or user group.
- Click the OK button.
- In the context menu of the Browse button, select the method for adding trusted users.
- If you want to take the values of the rule-triggering criteria listed in the Rule triggering criterion block from a file, do the following:
- Click the Set rule triggering criterion from file properties button.
The standard Microsoft Windows Open window opens.
- Select the file.
- Click the Open button.
The value of the criteria in the file are displayed in the fields in the Rule triggering criterion block. The criterion for which data are available in the file properties is selected by default.
- Click the Set rule triggering criterion from file properties button.
- In the Rule triggering criterion group box, select one or several of the following options as applicable:
- Digital certificate, if you want the rule to control the launch of applications launched using files signed with a digital certificate:
- Select the Use subject check box if you want the rule to control the launch of files signed with a digital certificate only with the specified subject.
- Select the Use thumb check box if you want the rule to only control the launch of files signed with a digital certificate with the specified thumbprint.
- SHA256 hash, if you want the rule to control the launch of programs launched using files whose checksum matches the one specified.
- Path to file, if you want the rule to control the launch of programs launched using files located at the specified path.
- Command line if you want the rule to control the start of programs launched using the arguments specified in the command line field. The field is enabled after you select the Path to file option. You can use ? and * characters as a mask when specifying the command line arguments for launched processes as a criterion.
Kaspersky Embedded Systems Security for Windows does not recognize paths that contain slashes ("/"). Use backslash ("\") to enter the path correctly.
When specifying the objects, you can use ? and * characters as file masks.
You should select at least one option. Otherwise, the Application Launch Control rule is not added.
- Digital certificate, if you want the rule to control the launch of applications launched using files signed with a digital certificate:
- If you want to add rule exclusions:
- In the Exclusions from rule section, click the Add button.
The Exclusion from rule window opens.
- In the Name field, enter the name of the exclusion.
- Specify the settings for exclusion of application files from the Applications Launch Control rule. You can fill out the settings fields from the file properties by clicking the Set exclusion based on file properties button.
- Digital certificate
If this option is selected, the presence of a digital certificate is specified as a rule triggering criterion in the settings of the newly generated allowing rules for Applications Launch Control. The application will now allow start of programs launched using files with a digital certificate. We recommend this option if you want to allow the start of any applications that are trusted in the operating system.
This option is selected by default.
- Use subject
The check box either enables or disables the use of the subject of the digital certificate as a rule triggering criterion.
If the check box is selected, the specified digital certificate subject is used as a rule triggering criterion. The created rule will control the start of applications only for the vendor specified in the subject.
If the check box is cleared, the application will not use the subject of the digital certificate as a rule triggering criterion. If the Digital certificate criterion is selected, the created rule will control the start of applications signed with a digital certificate containing any subject.
The subject of the digital certificate used to sign the file can be specified only from the properties of the selected file using the Set rule triggering criterion from file properties button located above the Rule triggering criterion block.
By default, the check box is cleared.
- Use thumb
The check box enables / disables the use of the thumbprint of the digital certificate as a rule triggering criterion.
If the check box is selected, the specified digital certificate thumbprint is used as a rule triggering criterion. The created rule will control the start of applications signed with a digital certificate with the specified thumbprint.
If the check box is cleared, the application will not use the thumbprint of the digital certificate as a rule triggering criterion. If the Digital certificate criterion is selected, the application will control the start of applications signed with a digital certificate with any thumbprint.
The thumbprint of the digital certificate used to sign the file can be specified only from the properties of the selected file using the Set rule triggering criterion from file properties button located above the Rule triggering criterion block.
By default, the check box is cleared.
- SHA256 hash
If this option is selected, the checksum of the file used to generate the rule is specified as a rule triggering criterion in the settings of the newly generated allowing rules for Applications Launch Control. The application will allow start of programs launched using files with the specified checksum.
We recommend this option for cases when the generated rules must achieve the highest level of security: a SHA256 checksum may be used as a unique file ID. Using a SHA256 checksum as a rule triggering criterion restricts the rule usage scope to one file.
- Click the OK button.
- If necessary, repeat steps (i)-(iv) to add additional exclusions.
- In the Exclusions from rule section, click the Add button.
- Click the OK button in the Rule settings window.
The created rule is displayed in the list in the Applications Launch Control rules window.