Kaspersky Endpoint Security for Windows 11.0.0
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- About Kaspersky Endpoint Security for Windows
- Installing and removing the application
- Installing the application
- About ways to install the application
- Installing the application by using the Setup Wizard
- Step 1. Making sure that the computer meets installation requirements
- Step 2. Welcome page of the installation procedure
- Step 3. Viewing the License Agreement and Privacy Policy
- Step 4. Selecting the installation type
- Step 5. Selecting application components to install
- Step 6. Selecting the destination folder
- Step 7. Adding scan exclusions
- Step 8. Preparing for application installation
- Step 9. Application installation
- Installing the application from the command line
- Remotely installing the application using System Center Configuration Manager
- Description of setup.ini file installation settings
- Initial Configuration Wizard
- Step 1. Application activation
- Step 2. Activating with an activation code
- Step 3. Activating with a key file
- Step 4. Selecting the functions to activate
- Step 5. Completing activation
- Step 6. Finishing the initial configuration of the application
- Step 7. Analyzing the operating system
- Step 8. Kaspersky Security Network Statement
- Updating to the new version of the application
- Removing the application
- Installing the application
- Application interface
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About subscription
- About activation code
- About the key
- About the key file
- About data provision
- Viewing license information
- Purchasing a license
- Renewing subscription
- Visiting the website of the service provider
- About application activation methods
- Starting and stopping the application
- Participation in Kaspersky Security Network
- About participation in Kaspersky Security Network
- Enabling and disabling use of Kaspersky Security Network
- About data provision when using Kaspersky Security Network
- Enabling and disabling cloud mode for protection components
- Checking the connection to Kaspersky Security Network
- Checking the reputation of a file in Kaspersky Security Network
- Enhanced protection with Kaspersky Security Network
- Application Behavior Detection
- Exploit Prevention
- Host Intrusion Prevention
- About Host Intrusion Prevention
- Limitations of audio and video device control
- Enabling and disabling Host Intrusion Prevention
- Managing application trust groups
- Managing Application control rules
- Changing application control rules for trust groups and groups of applications
- Editing an application control rule
- Disabling downloads and updates of application control rules from the Kaspersky Security Network database
- Disabling the inheritance of restrictions from the parent process
- Excluding specific application actions from application control rules
- Removing outdated application control rules
- Protecting operating system resources and identity data
- Remediation Engine
- File Threat Protection
- About File Threat Protection
- Enabling and disabling File Threat Protection
- Automatic pausing of File Threat Protection
- File Threat Protection settings
- Changing the security level
- Changing the action taken on infected files by the File Threat Protection component
- Forming the protection scope of the File Threat Protection component
- Using heuristic analysis in the operation of the File Threat Protection component
- Using scan technologies in the operation of the File Threat Protection component
- Optimizing file scanning
- Scanning compound files
- Changing the scan mode
- Web Threat Protection
- About Web Threat Protection
- Enabling and disabling Web Threat Protection
- Web Threat Protection settings
- Changing the web traffic security level
- Changing the action to take on malicious web traffic objects
- Web Threat Protection scanning of links to check them against databases of phishing and malicious web addresses
- Using heuristic analysis in the operation of the Web Threat Protection component
- Editing the list of trusted web addresses
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- Application Control
- About Application Control
- Enabling and disabling Application Control
- Application Control functionality limitations
- About Application Control rules
- Managing Application Control rules
- Editing Application Control message templates
- About Application Control operating modes
- Selecting the Application Control mode
- Managing Application Control rules using Kaspersky Security Center
- Gathering information about applications that are installed on user computers
- Gathering information about applications that are started on user computers
- Creating application categories
- Step 1. Selecting the category type
- Step 2. Entering a user category name
- Step 3. Configuring the conditions for including applications in a category
- Step 4. Configuring the conditions for excluding applications from a category
- Step 5. Settings
- Step 6. Repository folder
- Step 7. Creating a custom category
- Adding executable files from the Executable files folder to the application category
- Adding and modifying an Application Control rule using Kaspersky Security Center
- Changing the status of an Application Control rule via Kaspersky Security Center
- Testing Application Control rules using Kaspersky Security Center
- Viewing events resulting from test operation of the Application Control component
- Viewing events resulting from operation of the Application Control component
- Adding event-related executable files to the application category
- Viewing a report on test blocked runs
- Viewing a report on blocked runs
- Best practices for implementing white list mode
- Device Control
- About Device Control
- Enabling and disabling Device Control
- About rules of access to devices and connection buses
- About trusted devices
- Standard decisions on access to devices
- Editing a device access rule
- Adding or excluding records to or from the event log
- Adding a Wi-Fi network to the trusted list
- Editing a connection bus access rule
- Actions with trusted devices
- Adding a device to the Trusted list from the application interface
- Adding devices to the Trusted list based on the device model or ID
- Adding devices to the Trusted list based on the mask of the device ID
- Configuring user access to a trusted device
- Removing a device from the list of trusted devices
- Importing the list of trusted devices
- Exporting the list of trusted devices
- Editing templates of Device Control messages
- Anti-Bridging
- Obtaining access to a blocked device
- Creating a key for accessing a blocked device using Kaspersky Security Center
- Web Control
- About Web Control
- Enabling and disabling Web Control
- Web resource content categories
- About web resource access rules
- Actions with web resource access rules
- Migrating web resource access rules from previous versions of the application
- Exporting and importing the list of web resource addresses
- Editing masks for web resource addresses
- Editing templates of Web Control messages
- Data Encryption
- About data encryption
- Encryption functionality limitations
- Changing the encryption algorithm
- Enabling Single Sign-On (SSO) technology
- Special considerations for file encryption
- File Level Encryption on local computer drives
- Encryption of removable drives
- Full Disk Encryption
- Using the Authentication Agent
- Using a token and smart card with Authentication Agent
- Editing Authentication Agent help messages
- Limited support for characters in Authentication Agent help messages
- Selecting the Authentication Agent trace level
- Managing Authentication Agent accounts
- Adding a command for creating an Authentication Agent account
- Adding an Authentication Agent account editing command
- Adding a command for deleting an Authentication Agent account
- Restoring Authentication Agent account credentials
- Responding to a user request to restore Authentication Agent account credentials
- Viewing data encryption details
- Managing encrypted files with limited file encryption functionality
- Working with encrypted devices when there is no access to them
- Obtaining access to encrypted devices through the application interface
- Granting user access to encrypted devices
- Providing a user with a recovery key for hard drives encrypted with BitLocker
- Creating the executable file of Restore Utility
- Restoring data on encrypted devices using the Restore Utility
- Responding to a user request to restore data on encrypted devices
- Restoring access to encrypted data after operating system failure
- Creating an operating system rescue disk
- Endpoint Sensor
- Updating databases and application software modules
- Scanning the computer
- About scan tasks
- Starting or stopping a scan task
- Configuring scan task settings
- Changing the security level
- Changing the action to take on infected files
- Generating a list of objects to scan
- Selecting the type of files to scan
- Optimizing file scanning
- Scanning compound files
- Using scan methods
- Using scan technologies
- Selecting the run mode for the scan task
- Starting a scan task under the account of a different user
- Scanning removable drives when they are connected to the computer
- Working with active threats
- Checking the integrity of application modules
- Managing reports
- Notification service
- Managing Backup
- Advanced application settings
- Trusted zone
- About the trusted zone
- Creating a scan exclusion
- Modifying a scan exclusion
- Deleting a scan exclusion
- Enabling and disabling a scan exclusion
- Editing the list of trusted applications
- Enabling and disabling trusted zone rules for an application in the list of trusted applications
- Using trusted system certificate storage
- Network Protection
- Kaspersky Endpoint Security Self-Defense
- Kaspersky Endpoint Security performance and compatibility with other applications
- About Kaspersky Endpoint Security performance and compatibility with other applications
- Selecting types of detectable objects
- Enabling or disabling Advanced Disinfection technology for workstations
- Enabling or disabling Advanced Disinfection technology for file servers
- Enabling or disabling energy-saving mode
- Enabling or disabling conceding of resources to other applications
- Password protection
- Creating and using a configuration file
- Trusted zone
- Remote administration of the application through Kaspersky Security Center
- Managing the application from the command line
- Commands
- SCAN. Virus Scan
- UPDATE. Updating databases and application software modules
- ROLLBACK. Rolling back the last update
- TRACES. Traces
- START. Start the profile
- STOP. Stopping a profile
- STATUS. Profile status
- STATISTICS. Profile operation statistics
- RESTORE. Restoring files
- EXPORT. Exporting application settings
- IMPORT. Importing application settings
- ADDKEY. Applying a key file.
- LICENSE. Licensing
- RENEW. Purchasing a license
- PBATESTRESET. Reset the pre-encryption check results
- EXIT. Exit the application
- EXITPOLICY. Disabling policy
- STARTPOLICY. Enabling policy
- DISABLE. Disabling protection
- SPYWARE. Spyware detection
- Appendix. Application profiles
- Commands
- Sources of information about the application
- Contacting Technical Support
- Glossary
- Active key
- Additional key
- Administration group
- Administration Server
- Anti-virus databases
- Application modules
- Application settings
- Archive
- Authentication Agent
- Backup
- Black list of addresses
- Certificate
- Certificate issuer
- Certificate subject
- Certificate thumbprint
- Database of malicious web addresses
- Database of phishing web addresses
- Disinfection
- Exploits
- False alarm
- File mask
- Heuristic Analysis
- Infectable file
- Infected file
- License certificate
- Network Agent
- Network Agent Connector
- Network service
- Normalized form of the address of a web resource
- OLE object
- Patch
- Phishing
- Portable File Manager
- Protection scope
- Scan scope
- Signature Analysis
- Task
- Task settings
- Trusted Platform Module
- Update
- Information about third-party code
- Trademark notices
Selecting the Application Control mode
To select the Application Control mode:
- Open the application settings window.
- In the left part of the window, in the Security Controls section, select the Application Control subsection.
In the right part of the window, the settings of the Application Control component are displayed.
- Select the Enable Application Control check box to make the component settings available for editing.
- In the Application Control mode drop-down list, select one of the following items:
- Black List, if you want to allow the startup of all applications except the applications specified in block rules.
- White List, if you want to block the startup of all applications except the applications specified in allow rules.
The initially defined rules for white list mode are the Golden Image rule, which allows the startup of applications that are included in the "Golden Image" category, and the Trusted Updaters rule, which allows the startup of applications that are included in the "Trusted Updaters" KL category. The "Golden Image" KL category includes programs that ensure normal operation of the operating system. The "Trusted Updaters" KL category includes updaters for the most reputable software vendors. You cannot delete these rules. The settings of these rules cannot be edited. By default, the Golden Image rule is enabled, and the Trusted Updaters rule is disabled. All users are allowed to start applications that match the trigger conditions of these rules.
All rules created during the selected mode are saved after the mode is changed so that the rules can be used again. To revert to using these rules, all you have to do is select the necessary mode in the Application Control mode drop-down list.
- In the Action drop-down list, select the action to be performed by the component when a user attempts to start an application that is blocked by Application Control rules.
- Select the Control DLL and drivers check box if you want Kaspersky Endpoint Security to monitor the loading of DLL modules when applications are started by users.
Information about the module and the application that loaded the module will be saved to a report.
Kaspersky Endpoint Security monitors only the DLL modules and drivers loaded since the Control DLL and drivers check box was selected. Restart the computer after selecting the Control DLL and drivers check box if you want Kaspersky Endpoint Security to monitor all DLL modules and drivers, including ones loaded before Kaspersky Endpoint Security is started.
When enabling the function for controlling which DLL modules and drivers are loaded, make sure that the Application Control section has enabled the default Golden Image rule or another rule that contains the Trusted certificates KL category and ensures that trusted DLL modules and drivers are loaded before Kaspersky Endpoint Security is started. Enabling control of the loading of DLL modules and drivers when the Golden Image rule is disabled may cause instability in the operating system.
Application Control rules that were created based on other KL categories (except for the Trusted certificates KL category) are not used for startup control of DLL modules and drivers.
We recommend password protection be turned on to configure program settings so that it is possible to turn off allow rules blocking the launch of critically important DLL modules and drivers while not changing Kaspersky Security Center policy settings in the process.
- To save changes, click the Save button.