Kaspersky Endpoint Security 12.8 for Windows
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Čeština (Česká republika)
- Deutsch
- Español (España)
- Español (México)
- Français
- Italiano
- Magyar (Magyarország)
- Nederlands (Nederland)
- Polski (Polska)
- Português (Brasil)
- Português (Portugal)
- Română (România)
- Tiếng Việt (Việt Nam)
- Türkçe (Türkiye)
- Русский
- العربية (الإمارات العربية المتحدة)
- 한국어 (대한민국)
- 简体中文
- 繁體中文
- 日本語(日本)
- Kaspersky Endpoint Security for Windows Help
- Kaspersky Endpoint Security for Windows
- Modes of the application: Standard, EDR Agent, Light Agent
- Distribution kit
- Hardware and software requirements
- Comparison of available application features depending on the type of operating system
- Comparison of application functions depending on the management tools
- Compatibility with other applications
- Installing and removing the application
- Deployment through Kaspersky Security Center
- Installing the application locally using the Wizard
- Remotely installing the application using System Center Configuration Manager
- Description of setup.ini file installation settings
- Change application components
- Upgrading from a previous version of the application
- Removing the application
- Application licensing
- About the End User License Agreement
- About the license
- About the license certificate
- About subscription
- About license key
- About activation code
- About the key file
- Comparison of application functionality depending on license type for workstations
- Comparison of application functionality depending on license type for servers
- Activating the application
- Removing a license key
- Viewing license information
- Purchasing a license
- Renewing subscription
- Data provision
- Getting started
- About the Kaspersky Endpoint Security for Windows Management Plug-in
- Special considerations when working with different versions of management plug-ins
- Special considerations when using encrypted protocols for interacting with external services
- Application interface
- Getting started
- Managing policies
- Task management
- Configuring local application settings
- Starting and stopping Kaspersky Endpoint Security
- Pausing and resuming computer protection and control
- Creating and using a configuration file
- Restoring the default application settings
- Malware Scan
- Updating databases and application software modules
- Working with active threats
- Computer protection
- File Threat Protection
- Enabling and disabling File Threat Protection
- Automatic pausing of File Threat Protection
- Changing the action taken on infected files by the File Threat Protection component
- Forming the protection scope of the File Threat Protection component
- Using scan methods
- Using scan technologies in the operation of the File Threat Protection component
- Optimizing file scanning
- Scanning compound files
- Changing the scan mode
- Container Scan
- Web Threat Protection
- Mail Threat Protection
- Enabling and disabling Mail Threat Protection
- Changing the action to take on infected email messages
- Forming the protection scope of the Mail Threat Protection component
- Scanning compound files attached to email messages
- Email messages attachment filtering
- Exporting and importing extensions for attachment filtering
- Scanning emails in Microsoft Office Outlook
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Enabling and disabling Behavior Detection
- Selecting the action to take on detecting malware activity
- Protection of shared folders against external encryption
- Enabling and disabling protection of shared folders against external encryption
- Configuring the blocking period of an untrusted computer
- Editing the protection scope
- Adding trusted computers for external data encryption
- Exporting and importing a list of exclusions from protection of shared folders against external encryption
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Encrypted connections scan
- Wipe Data
- File Threat Protection
- Computer control
- Web Control
- Adding a web resource access rule
- Filter by web resource addresses
- Filter by web resource content
- Testing web resource access rules
- Exporting and importing Web Control rules
- Exporting and importing web resource addresses of the Web Control rule
- Monitoring user Internet activity
- Editing templates of Web Control messages
- Editing masks for web resource addresses
- Web Control for virtual machines
- Device Control
- Enabling and disabling Device Control
- About access rules
- Editing a device access rule
- Editing a connection bus access rule
- Managing access to mobile devices
- Managing access to Bluetooth devices
- Control of printing
- Control of Wi-Fi connections
- Monitoring usage of removable drives
- Changing the caching duration
- Actions with trusted devices
- Obtaining access to a blocked device
- Editing templates of Device Control messages
- Anti-Bridging
- Adaptive Anomaly Control
- Enabling and disabling Adaptive Anomaly Control
- Enabling and disabling an Adaptive Anomaly Control rule
- Modifying the action taken when an Adaptive Anomaly Control rule is triggered
- Creating an exclusion for an Adaptive Anomaly Control rule
- Exporting and importing exclusions for Adaptive Anomaly Control rules
- Applying updates for Adaptive Anomaly Control rules
- Editing Adaptive Anomaly Control message templates
- Viewing Adaptive Anomaly Control reports
- Application Control
- Application Control functionality limitations
- Receiving information about the applications that are installed on users' computers
- Enabling and disabling Application Control
- Selecting the Application Control mode
- Managing Application Control rules
- Adding a trigger condition for the Application Control rule
- Adding executable files from the Executable files folder to the application category
- Adding event-related executable files to the application category
- Adding an Application Control rule
- Changing the status of an Application Control rule via Kaspersky Security Center
- Exporting and importing Application Control rules
- Viewing events resulting from operation of the Application Control component
- Viewing a report on blocked applications
- Testing Application Control rules
- Application activity monitor
- Rules for creating name masks for files or folders
- Editing Application Control message templates
- Best practices for implementing a list of allowed applications
- Network ports monitoring
- Log Inspection
- System Integrity Monitoring
- Cloud Discovery
- Web Control
- Trusted zone
- Managing Backup
- Notification service
- Managing reports
- Kaspersky Endpoint Security Self-Defense
- Kaspersky Endpoint Security performance and compatibility with other applications
- Data Encryption
- Encryption functionality limitations
- Changing the length of the encryption key (AES56 / AES256)
- Kaspersky Disk Encryption
- Special features of SSD drive encryption
- Starting Kaspersky Disk Encryption
- Creating a list of hard drives excluded from encryption
- Exporting and importing a list of hard drives excluded from encryption
- Enabling Single Sign-On (SSO) technology
- Managing Authentication Agent accounts
- Using a token and smart card with Authentication Agent
- Hard drive decryption
- Restoring access to a drive protected by Kaspersky Disk Encryption technology
- Signing in with the Authentication Agent service account
- Updating the operating system
- Eliminating errors of encryption functionality update
- Selecting the Authentication Agent tracing level
- Editing Authentication Agent help texts
- Removing leftover objects and data after testing the operation of Authentication Agent
- BitLocker Management
- File Level Encryption on local computer drives
- Encrypting files on local computer drives
- Forming encrypted file access rules for applications
- Encrypting files that are created or modified by specific applications
- Generating a decryption rule
- Decrypting files on local computer drives
- Creating encrypted packages
- Restoring access to encrypted files
- Restoring access to encrypted data after operating system failure
- Editing templates of encrypted file access messages
- Encryption of removable drives
- Viewing data encryption details
- Working with encrypted devices when there is no access to them
- Detection and Response solutions
- MDR and EDR Optimum licensing
- Kaspersky Endpoint Agent
- Endpoint Detection and Response Agent
- Managed Detection and Response
- Endpoint Detection and Response
- Kaspersky Sandbox
- Kaspersky Anti Targeted Attack Platform
- Managing Quarantine
- Kaspersky Unified Monitoring and Analysis Platform (KUMA)
- KSWS to KES Migration Guide
- Correspondence of KSWS and KES components
- Correspondence of KSWS and KES settings
- Migrating KSWS components
- Migrating KSWS tasks and policies
- Migrating KSWS trusted zone
- Migrating KSWS Applications Launch Control rules
- Installing KES instead of KSWS
- Migrating the [KSWS+KEA] configuration to [KES+built-in agent] configuration
- Making sure Kaspersky Security for Windows Server was successfully removed
- Activating KES with a KSWS key
- Special considerations for migrating high-load servers
- Managing the application on a server in Server Core mode
- Migrating from [KSWS+KEA] to [KES+built-in agent]
- Light Agent mode to protect virtual machines
- Managing the application from the command line
- Setup. Installing the application
- Setup /x. Removing the application
- AVP commands
- SCAN. Malware Scan
- UPDATE. Updating databases and application software modules
- ROLLBACK. Last update rollback
- TRACES. Tracing
- START. Starting a profile
- STOP. Stopping a profile
- STATUS. Profile status
- STATISTICS. Profile operation statistics
- RESTORE. Restoring files from Backup
- EXPORT. Exporting application settings
- IMPORT. Importing application settings
- ADDKEY. Applying a key file
- LICENSE. Licensing
- RENEW. Purchasing a license
- PBATESTRESET. Resetting the disk check results before encrypting the disk
- EXIT. Exiting the application
- EXITPOLICY. Disabling policy
- STARTPOLICY. Enabling policy
- DISABLE. Disabling protection
- SPYWARE. Spyware detection
- KSN. Switching between KSN / KPSN
- SERVERBINDINGDISABLE. Disabling the server connection protection
- KESCLI commands
- Scan. Malware Scan
- GetScanState. Scan completion status
- GetLastScanTime. Determining the scan completion time
- GetThreats. Obtaining data on detected threats
- UpdateDefinitions. Updating databases and application software modules
- GetDefinitionState. Determining the release date and time of the databases
- EnableRTP. Enabling protection
- GetRealTimeProtectionState. File Threat Protection status
- GetEncryptionState. Disk encryption status
- Version. Identifying the application version
- Detection and Response management commands
- Light Agent management commands
- Error codes
- Appendix. Application profiles
- Managing the application through the REST API
- Sources of information about the application
- Contacting Technical Support
- Limitations and warnings
- Glossary
- Active key
- Administration group
- Anti-virus databases
- Archive
- Authentication Agent
- Certificate issuer
- Cloud Discovery
- Database of malicious web addresses
- Database of phishing web addresses
- Disinfection
- False alarm
- Infectable file
- Infected file
- Integration Server
- IOC
- IOC file
- License certificate
- Light Agent
- Mask
- Network Agent
- Normalized form of the address of a web resource
- OLE object
- OpenIOC
- Portable File Manager
- Protection scope
- Scan scope
- SVM
- Task
- Trusted Platform Module
- Appendices
- Appendix 1. Application settings
- File Threat Protection
- Web Threat Protection
- Mail Threat Protection
- Network Threat Protection
- Firewall
- BadUSB Attack Prevention
- AMSI Protection
- Exploit Prevention
- Behavior Detection
- Host Intrusion Prevention
- Remediation Engine
- Kaspersky Security Network
- Log Inspection
- Web Control
- Device Control
- Application Control
- Adaptive Anomaly Control
- System Integrity Monitoring
- Endpoint Sensor
- Sandbox
- Managed Detection and Response
- Endpoint Detection and Response
- Endpoint Detection and Response (KATA)
- Network Detection and Response (KATA)
- Full Disk Encryption
- File Level Encryption
- Encryption of removable drives
- Templates (data encryption)
- Exclusions
- Application settings
- Reports and storage
- Network settings
- Interface
- Manage Settings
- Updating databases and application software modules
- Appendix 2. Application trust groups
- Appendix 3. File extensions for quick removable drives scan
- Appendix 4. File Types for the Mail Threat Protection attachment filter
- Appendix 5. Network settings for interaction with external services
- Appendix 6. Application events
- Appendix 7. Supported file extensions for Execution prevention
- Appendix 8. Supported script interpreters for Execution prevention
- Appendix 9. IOC scan scope in the registry (RegistryItem)
- Appendix 10. IOC file requirements
- Appendix 11. User accounts in application component rules
- Appendix 1. Application settings
- Information about third-party code
- Trademark notices
On-Demand System Integrity Check
On-Demand System Integrity Check is a task that you can run manually or on a schedule. When running the System Integrity Check task, the application compares the current state of the objects included in the monitoring scope with their baseline state. In contrast to Real-Time System Integrity Monitoring, the System Integrity Check task helps limit the number of events and lets you generate an overall report of changes in the operating system.
For System Integrity Monitoring to work, you must add at least one rule. A System Integrity Monitoring rule is a set of criteria that define the access of users to files and the registry. System Integrity Monitoring detects changes in the files and the registry within the specified monitoring scope. The monitoring scope is one of the criteria of a System Integrity Monitoring rule. You can configure rules to be shared by Real-Time System Integrity Monitoring and the System Integrity Check task or create separate rules for the task. To create a baseline, Kaspersky Endpoint Security applies the monitoring scope from the System Integrity Check task to the Baseline update task.
Creating and updating a baseline
The System Integrity Check task needs a baseline to work. A baseline is a recorded state of objects in the system, which the application uses as reference when comparing to the current state. If the current state of the system is different from the state of the system as recorded in the baseline, Kaspersky Endpoint Security generates the corresponding event. You can create or update a baseline using the Baseline update task.
You can update the baseline in the following modes:
- Full update.
The application updates all objects in the monitoring scope.
- Incremental update.
The application detects and updates only modified or new objects.
How to create or update a baseline in the Administration Console (MMC)
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Tasks.
The list of tasks opens.
- Click New task.
The Task Wizard starts. Follow the instructions of the Wizard.
Step 1. Selecting task type
Select Kaspersky Endpoint Security for Windows (12.8) → Baseline update.
Step 2. Selecting the baseline update mode
Select a baseline update mode:
- Full update. The application updates all objects in the monitoring scope.
- Incremental update. The application detects and updates only modified or new objects.
Step 3. Selecting the devices to which the task will be assigned
Select the computers on which the task will be performed. The following options are available:
- Assign the task to an administration group. In this case, the task is assigned to computers included in a previously created administration group.
- Select computers detected by the Administration Server in the network: unassigned devices. The specific devices can include devices in administration groups as well as unassigned devices.
- Specify device addresses manually, or import addresses from a list. You can specify NetBIOS names, IP addresses, and IP subnets of devices to which you want to assign the task.
Step 4. Defining the task name
Enter the name of the task, for example Baseline 2024.
Step 5. Completing task creation
Exit the Wizard. If necessary, select the Run the task after the wizard finishes check box. You can monitor the progress of the task in the task properties.
How to create or update a baseline in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Tasks.
The list of tasks opens.
- Click Add.
The Task Wizard starts.
- Configure the task settings:
- In the Application drop-down list, select Kaspersky Endpoint Security for Windows (12.8.0).
- In the Task type drop-down list, select Baseline update.
- In the Task name field, enter a brief description, for example, Baseline 2024.
- In the Devices to which the task will be assigned block, select the task scope.
- Select devices according to the selected task scope option. Go to the next step.
- Select an account to run the task. By default, Kaspersky Endpoint Security starts the task with the rights of a local user account.
- Exit the Wizard.
A new task will be displayed in the list of tasks.
- Click the new task.
The task properties window opens.
- Select the Application settings tab.
- Select a baseline update mode:
- Full update. The application updates all objects in the monitoring scope.
- Incremental update. The application detects and updates only modified or new objects.
- Save your changes.
- Select the check box next to the task.
- Click Start.
Configuring the monitoring scope for the System Integrity Check task
By default, the monitoring scope of the System Integrity Check task is the same as the monitoring scope of Real-Time System Integrity Monitoring. You can configure a different monitoring scope for the task.
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Policies.
- Select the necessary policy and double-click to open the policy properties.
- In the policy window, select Security Controls → System Integrity Monitoring.
- Select the System Integrity Monitoring check box.
- Under System Integrity Check, select the task configuration mode: Custom settings.
- Configure external device monitoring:
- Select the Monitor devices check box.
- In the Event severity level drop-down list, select the importance level of external device monitoring events: Informational
, Warning
, Critical
.
System Integrity Monitoring records information about connected external devices at the time when the baseline is created. Subsequently, when an external device is connected, the application generates a corresponding event. When running the System Integrity Check task, the application does not monitor the disconnection of external devices.
- Configure file and registry monitoring:
- Select the Monitor files and the registry check box.
- Click Settings.
This opens the list of System Integrity Monitoring rules.
- Click Add.
You can also import rules from another source.
You can export the list of System Integrity Monitoring rules to an XML file. Then you can modify the file to, for example, add a large number of records of the same type. You can use the export/import function to back up the list of System Integrity Monitoring rules or to migrate the list to a different server.
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Policies.
- Select the necessary policy and double-click to open the policy properties.
- In the policy window, select Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Settings button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Settings.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
How to export and import a list of System Integrity Check rules in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
- Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
- Select the Application settings tab.
- Go to Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Configure button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Configure.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
- Configure the Real-Time System Integrity Monitoring rule (see the table below).
- Save your changes.
How to configure a different monitoring scope for the System Integrity Check task in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
- Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
- Select the Application settings tab.
- Go to Security Controls → System Integrity Monitoring.
- Turn on the System Integrity Monitoring toggle.
- Under System Integrity Check, select the task configuration mode: Custom settings.
- Configure external device monitoring:
- Select the Monitor devices check box.
- In the Event severity level drop-down list, select the importance level of external device monitoring events: Informational
, Warning
, Critical
.
System Integrity Monitoring records information about connected external devices at the time when the baseline is created. Subsequently, when an external device is connected, the application generates a corresponding event. When running the System Integrity Check task, the application does not monitor the disconnection of external devices.
- Configure file and registry monitoring:
- Select the Monitor files and the registry check box.
- Click Configure.
This opens the list of System Integrity Monitoring rules.
- Click Add.
You can also import rules from another source.
You can export the list of System Integrity Monitoring rules to an XML file. Then you can modify the file to, for example, add a large number of records of the same type. You can use the export/import function to back up the list of System Integrity Monitoring rules or to migrate the list to a different server.
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Policies.
- Select the necessary policy and double-click to open the policy properties.
- In the policy window, select Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Settings button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Settings.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
How to export and import a list of System Integrity Check rules in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
- Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
- Select the Application settings tab.
- Go to Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Configure button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Configure.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
- Configure the Real-Time System Integrity Monitoring rule (see the table below).
- Save your changes.
- In the main application window, click the
button.
- In the application settings window, select Security Controls → System Integrity Monitoring.
- Turn on the System Integrity Monitoring toggle switch.
- Under System Integrity Check, select the task configuration mode: Custom settings.
- Configure external device monitoring:
- Select the Monitor devices check box.
- In the Event severity level drop-down list, select the importance level of external device monitoring events: Informational
, Warning
, Critical
.
System Integrity Monitoring records information about connected external devices at the time when the baseline is created. Subsequently, when an external device is connected, the application generates a corresponding event. When running the System Integrity Check task, the application does not monitor the disconnection of external devices.
- Configure file and registry monitoring:
- Select the Monitor files and the registry check box.
- Click Set up.
This opens the list of System Integrity Monitoring rules.
- Click Add.
You can also import rules from another source.
You can export the list of System Integrity Monitoring rules to an XML file. Then you can modify the file to, for example, add a large number of records of the same type. You can use the export/import function to back up the list of System Integrity Monitoring rules or to migrate the list to a different server.
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Policies.
- Select the necessary policy and double-click to open the policy properties.
- In the policy window, select Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Settings button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Settings.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
If you did not select any rule, Kaspersky Endpoint Security will export all rules.
- Click the Export link.
- In the window that opens, specify the name of the XML file to which you want to export the list of rules, and select the folder in which you want to save this file.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to the XML file.
- Select the rules that you want to export. To select multiple ports, use the CTRL or SHIFT keys.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
How to export and import a list of System Integrity Check rules in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Policies & profiles.
- Click the name of the Kaspersky Endpoint Security policy.
The policy properties window opens.
- Select the Application settings tab.
- Go to Security Controls → System Integrity Monitoring.
- To export or import Real-Time System Integrity Monitoring rules:
- In the Real-Time System Integrity Monitoring block, click the Configure button.
- To export a list of Real-Time System Integrity Monitoring rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of Real-Time System Integrity Monitoring rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- To export or import System Integrity Check rules:
- In the System Integrity Check block, select Custom settings.
- Click Configure.
- To export the list of System Integrity Check rules:
- Select the rules that you want to export.
- Click Export.
- Confirm that you want to export only the selected rules, or export the entire list.
- Save the file.
Kaspersky Endpoint Security exports the list of rules to an XML file in the default downloads folder.
- To import a list of System Integrity Check rules:
- Click the Import link.
In the window that opens, select the XML file from which you want to import the list of rules.
- Open the file.
If the computer already has a list of rules, Kaspersky Endpoint Security will prompt you to delete the existing list or add new entries to it from the XML file.
- Click the Import link.
- Save your changes.
- Configure the Real-Time System Integrity Monitoring rule (see the table below).
- Save your changes.
Settings of a System Integrity Check task rule
Parameter |
Description |
---|---|
Rule name |
Name of the System Integrity Check task rule. |
Event severity level |
Kaspersky Endpoint Security logs file modification events whenever a file or registry key in the monitoring scope is modified. The following event severity levels are available: Informational |
Monitoring scope |
|
Exclusions |
|
Running the System Integrity Check task
The System Integrity Check task allows checking files or registry keys for changes and also checking the connection of external devices. To check files for changes, you can run the System Integrity Check task in the following modes:
- Quick Scan.
When checking files for changes, the applications checks only file attributes. The application does not check the content of files.
- Full Scan.
When checking files for changes, the applications checks all file attributes and the content of files.
The mode the task runs in does not affect the checking of the registry or external devices.
How to run the System Integrity Check task in the Administration Console (MMC)
- Open the Kaspersky Security Center Administration Console.
- In the console tree, select Tasks.
The list of tasks opens.
- Click New task.
The Task Wizard starts. Follow the instructions of the Wizard.
Step 1. Selecting task type
Select Kaspersky Endpoint Security for Windows (12.8) → System Integrity Check.
Step 2. Selecting the System Integrity Check mode
Select a System Integrity Check mode:
- Quick Scan. The application checks only file attributes. The application does not check the content of files.
- Full Scan. The application checks all attributes of files as well as their content.
Step 3. Selecting the devices to which the task will be assigned
Select the computers on which the task will be performed. The following options are available:
- Assign the task to an administration group. In this case, the task is assigned to computers included in a previously created administration group.
- Select computers detected by the Administration Server in the network: unassigned devices. The specific devices can include devices in administration groups as well as unassigned devices.
- Specify device addresses manually, or import addresses from a list. You can specify NetBIOS names, IP addresses, and IP subnets of devices to which you want to assign the task.
Step 4. Defining the task name
Enter a name for the task, for example, Weekly System Integrity Check.
Step 5. Completing task creation
Exit the Wizard. If necessary, select the Run the task after the wizard finishes check box. You can monitor the progress of the task in the task properties.
How to run a System Integrity Check task in the Web Console
- In the main window of the Web Console, select Assets (Devices) → Tasks.
The list of tasks opens.
- Click Add.
The Task Wizard starts.
- Configure the task settings:
- In the Application drop-down list, select Kaspersky Endpoint Security for Windows (12.8.0).
- In the Task type drop-down list, select System Integrity Check.
- In the Task name field, enter a brief description, for example, Weekly System Integrity Check.
- In the Devices to which the task will be assigned block, select the task scope.
- Select devices according to the selected task scope option. Go to the next step.
- Select an account to run the task. By default, Kaspersky Endpoint Security starts the task with the rights of a local user account.
- Exit the Wizard.
A new task will be displayed in the list of tasks.
- Click the new task.
The task properties window opens.
- Select the Application settings tab.
- Select a System Integrity Check mode:
- Quick Scan. The application checks only file attributes. The application does not check the content of files.
- Full Scan. The application checks all attributes of files as well as their content.
- Save your changes.
- Select the check box next to the task.
- Click Start.
For the System Integrity Check task to finish successfully, the monitoring scope of the System Integrity Check task must completely match the baseline. If the monitoring scope is different, the task finishes with an error. To synchronize monitoring scopes, run the Baseline update task with a new monitoring scope.