Kaspersky Endpoint Security has a number of limitations that are not critical to operation of the application.
As a result, the new version of the application is installed on user computers. Check the status of the computers in the Kaspersky Security Center console.
/pCITRIXCOMPATIBILITY=1. In case of remote installation, the KUD file must be edited by adding the following parameter to it:
For details about Citrix XenDesktop, visit the Citrix Support website.
When adding Notepad to an Application Control rule, you can specify the application name and the file hash from the properties of the running application, for example.
*character to the beginning of the path when specifying the target object.
If a similar situation occurs, restart the computer. After the computer has been restarted, access to the encrypted removable drive will be granted.
<domain>/<Windows account name>, after changing the computer name you need to also change the names of accounts that were created for local users of this computer. For example, imagine that there is a local user
Ivanovcomputer, and an Authentication Agent account with the name
Ivanov/Ivanovhas been created for this user. If the computer name
Ivanovhas been changed to
Ivanov-PC, you need to change the name of the Authentication Agent account for the user
Ivanov-PC/Ivanov. You can change the account name using the local account management task of the Authentication Agent. Before the name of the account has been changed, authentication in the preboot environment is possible using the old name (for example,
Access is impossible even if you know the password of the Portable File Manager.
AMPPL=1parameter (by default, the parameter value is set to
1starting with the Windows 10RS2 operating system version). The
AMPPLparameter with a value of
1enables the use of Protection Processes technology for the product service.
\character at the end, for example,
C:\folder1\folder2, the scan will be run for the path C:\folder1\.
C:\Program Files (x86)\Common Files\Kaspersky Lab\KES.<version>\klhk\klhk_x64\folder. If you selected this method, you need to additionally clear the Download updates of application modules check box in the Update task settings for Kaspersky Endpoint Security. For details on using SRP, refer to the Microsoft documentation.
You can also disable SRP and use the Application Control component of Kaspersky Endpoint Security to control application usage.
The application cannot be installed on a computer where Secret Net Studio is deployed with the Antivirus component. To make interoperability possible, you must remove the Antivirus component from Secret Net Studio.
The application cannot be installed on a computer where Secret Net Studio is deployed with the Full Disk Encryption component. To make interoperability possible, you must remove the Full Disk Encryption component from Secret Net Studio.
When you install Kaspersky Endpoint Security with the File Level Encryption (FLE) component, Secret Net Studio can operate with errors. To ensure interoperability, you must remove the File Level Encryption (FLE) component from Kaspersky Endpoint Security.