Apéndice. Correspondencia de las configuraciones de KSWS y KES

Ampliar todo | Contraer todo

Al migrar directivas y tareas, KES se configura de acuerdo con la configuración de KSWS. La configuración de los componentes de la aplicación que KSWS no tiene se establece en los valores predeterminados.

Application settings

Scalability, interface and scanning settings

Security and reliability

Connection settings

Run local system tasks

Supplementary

Trusted zone

Removable drives scan

User permissions for application management

User access permissions for Kaspersky Security Service management

Storages

Real-time server protection

Real-Time File Protection

KSN Usage

Traffic Security

Exploit Prevention

Network Threat Protection

Script Monitoring

Website categories

Local activity control

Applications Launch Control

Device Control

Network-Attached Storages Protection

RPC Network Storage Protection

ICAP Network Storage Protection

Anti-Cryptor for NetApp

Network activity control

Firewall Management

Anti-Cryptor

System Inspection

File Integrity Monitor

Log Inspection

Logs and notifications

Task logs

Event notifications

Interaction with Administration Server

Tasks

Activation of the application

Copying Updates

Baseline File Integrity Monitor

Database Update

Software modules updates

Rollback of Application Database Update

On-Demand Scan

Application Integrity Control

Rule Generator for Applications Launch Control

Rule Generator for Device Control

Inicio de página