- About Kaspersky Security 9.0 for Microsoft Exchange Servers
- Application architecture
- Common application deployment procedures and scenarios
- Installing, configuring, restoring, and removing the application
- Installing the application using the Setup Wizard
- Step 1. Checking for required software
- Step 2. Viewing information about the start of installation. Reading the End User License Agreement and the Privacy Policy
- Step 3. Selecting the installation type
- Step 4. Selecting application components and modules
- Step 5. Creating a database and configuring the application connection to the SQL server
- Step 6. Selecting an account for launching the Kaspersky Security service
- Step 7. Completing installation
- Installing the application using the command line
- Initial setup of the application
- Step 1. Activating the application
- Step 2. Configuring the Microsoft Exchange server protection
- Step 3. Enabling the KSN service
- Step 4. Configuring the proxy server settings
- Step 5. Completing the configuration
- Application Activation window
- Protection settings window
- Use Kaspersky Security Network services window
- Proxy server settings window
- Configuration node
- Restoring the application
- Removing the application
- Installing the application using the Setup Wizard
- Installing Update Package 9.6 Patch 1
- Kerberos protocol support
- Upgrading the application to version 9.0 Maintenance Release 6
- To administrator
- Role-based user access control for the application features and services
- Working with personal data of users
- Application licensing
- Licensing models. License restrictions
- About the End User License Agreement
- About the license certificate
- About the license
- About the key
- About the key file
- About the activation code
- About the subscription
- Special considerations of activating the application when using profiles
- Activating the application with a key for a Security Server
- Activating the application using an activation code
- About notifications related to the license
- Configuring the license expiry term notification
- Viewing information about installed keys
- Replacing a key
- Removing a key
- Licensing node
- Add License window
- Viewing the number of mailboxes
- Starting and stopping the application
- Default Microsoft Exchange Server protection
- <Microsoft Exchange Server name> node
- Viewing Microsoft Exchange Server protection status details
- Viewing information about the protection status of Microsoft Exchange servers of a single profile
- Server protection node
- Protection for the Mailbox role tab
- Protection for the Hub Transport role tab
- Advanced Anti-Virus settings tab
- About Kaspersky Security Network
- Participating in Kaspersky Security Network
- About Kaspersky Private Security Network
- Configuring the settings for connecting to Kaspersky Private Security Network
- Enabling and disabling the use of Kaspersky Security Network and Kaspersky Private Security Network in Anti-Spam
- Enabling and disabling the use of Kaspersky Security Network and Kaspersky Private Security Network in Anti-Virus
- Anti-virus protection
- Enabling and disabling anti-virus server protection
- Configuring anti-virus object processing: Anti-Virus for the Hub Transport role
- Configuring anti-virus processing of objects: Anti-Virus for the Mailbox role
- Configuring anti-virus scan exclusions
- Editing of the message regarding removal of an attachment by the Anti-Virus module
- How to prevent detainment when sending messages through the Anti-Virus module
- Types of attachment files window
- Names of attachment files window
- Protection against spam and phishing
- Enabling and disabling anti-spam protection of a server
- About anti-phishing scans
- Enabling and disabling message scanning for phishing
- Configuring spam and phishing scan settings
- Configuring additional settings of spam and phishing scans
- Configuring an increase in the spam rating of messages
- About additional services, features, and anti-spam technologies
- Using external anti-spam message scanning services
- About lists of allowed and denied email addresses
- Creating an Anti-Spam address allowlist
- Creating an Anti-Spam address denylist
- Address Allowlist Record Parameters window
- Address Denylist Record Parameters window
- Informing Kaspersky of false alerts returned by Anti-Spam
- Improving the accuracy of spam detection on Microsoft Exchange 2013 servers
- About scanning outgoing mail for spam and phishing content
- Enabling and disabling the scanning of outgoing messages for spam and phishing content
- Configuring mailbox and public folder protection settings
- Background scan and on-demand scan
- Attachment and content filtering
- Enabling attachment filtering
- Managing attachment and content filtering rules
- Creating an attachment and content filtering rule
- Configuring the general settings and conditions of an attachment and content filtering rule
- Configuring lists of users for an attachment and content filtering rule
- Configuring exclusions from an attachment and content filtering rule
- Deleting an attachment and content filtering rule
- Editing of the message regarding removal of an attachment during filtering
- Filtering messages of the same type
- Managing profiles
- Creating a profile
- Configuring Security Servers in a profile
- Specifics of managing profiles in a Microsoft Exchange database availability group
- Adding Security Servers to a profile
- Managing access to a profile
- Removing a Security Server from a profile
- Removing a profile
- Profiles node
- <Profile name> node
- Servers node
- <DAG name> node
- Create new profile window
- Add server to <Profile name> profile window (Step 1)
- Add server to <Profile name> profile window (Step 2)
- Rename existing profile window
- Updates
- About update centers
- About database updates in configurations with a DAG of Microsoft Exchange servers
- Updating databases manually
- Configuring scheduled application database updates
- Select update source
- Configuring the proxy server settings
- Designating a server as an update center and configuring its settings
- Updates node
- Notifications
- Backup
- Viewing Backup objects
- Viewing the properties of objects in Backup
- Filtering the list of Backup objects
- Saving objects from Backup to disk
- Forwarding objects from Backup to their original recipients
- Forwarding of objects from Backup to other email addresses
- Deleting objects from Backup
- Configuring Backup settings
- Selecting Backup database for viewing its contents from the profile
- Database window
- Send object to Kaspersky window
- Backup node
- Reports
- Anti-Virus activity report for the Mailbox role
- Anti-Virus activity report for the Hub Transport role
- Report of Anti-Spam activity
- Generating a report manually
- Creating a report generation task
- Viewing the list of report generation tasks
- Editing the settings of a report generation task
- Starting a report generation task
- Deleting a report generation task
- Viewing a report
- Saving a report to disk
- Deleting a report
- Report generation settings window
- Task settings window
- Reports node
- Application logs
- Using Kaspersky Security in Windows PowerShell
- About Windows PowerShell commands
- Connecting the Kse.Powershell library
- Viewing the protection status of a Microsoft Exchange server
- Viewing the statistics of the Anti-Virus and Attachment and Content Filtering modules
- Viewing the statistics of the Anti-Spam module
- Viewing the Anti-Spam address allowlist
- Viewing the Anti-Spam address denylist
- Adding addresses to the Anti-Spam address allowlist
- Adding addresses to the Anti-Spam address denylist
- Deleting addresses from the Anti-Spam address allowlist
- Deleting addresses from the Anti-Spam address denylist
- Synchronizing the Anti-Spam address allowlists and denylists
- Working with a message signature decryption key
- Exporting and importing the application configuration
- Managing the application using the Kaspersky Security Center
- Installing the Kaspersky Security administration plug-in
- About application activation via Kaspersky Security Center
- Updating application databases via Kaspersky Security Center
- Kaspersky Security events in Kaspersky Security Center
- Viewing Microsoft Exchange Server protection status details
- Application operation statistics in Kaspersky Security Center
- Monitor the application's operation via System Center - Operations Manager
- Appendix. Script for sending spam for analysis
- Appendix. Scalability and Sizing Guide
- Contacting the Technical Support Service
- Sources of information about the application
- Glossary
- Active key
- Anti-virus databases
- Background scan
- Backup
- Container object
- Disinfection
- Domain Name System Block List (DNSBL).
- Enforced Anti-Spam Updates Service
- File mask
- Formal message
- Infected object
- Kaspersky CompanyAccount
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN).
- Kaspersky update servers
- Key denylist
- License certificate
- License term
- Malicious URLs
- Managed device
- Management Console
- Mass mail
- Message deletion
- Object removal
- PCL rating
- Personal data
- Phishing
- Potential spam
- Probably infected object
- Profile
- Proxy server
- Reserve key
- SCL rating
- Security Server
- Simple object
- Spam
- Spam URI Realtime Block Lists (SURBL)
- Storage scan
- Unknown virus
- Update
- Virus
- Information about third-party code
- Trademark notice
Backup node
Clicking this button opens a Database.window. This button is displayed only when the Backup section is viewed from inside a profile.
The filter of Backup objects is located in the upper part of the workspace. You can use the filter to locate Backup objects with specific parameters and display them in the table.
Clicking this button causes a row with fields for defining a new filter condition to be added to the filter. After the row has been added, fill out the fields for a new condition. Filtering conditions are combined using the "AND" logical operator.
You can remove a condition from the filter by clicking the button located in the right part of the row.
When filter conditions are added or removed, the changes are not applied automatically. To apply the changes, click the Search button.
Clicking this button causes the application to display Backup objects that meet the filtering conditions in the list.
Clicking this button causes the application to delete the selected object from Backup.
Clicking the arrow next to the button opens a menu with the Delete and Delete all items.
Selecting the Delete item causes the application to delete the selected object from Backup.
Selecting the Delete all menu item causes the application to delete all objects from Backup.
This button is only available to users who have been assigned the Administrator role.
Clicking this button opens a window with the properties of the selected object. If several objects are selected, the status tags of all selected objects and the number of selected objects with a particular status tag are shown.
Clicking this button opens a window for selecting a local drive folder for saving the selected Backup object. You can enter or edit the object name. You can save objects to disk only one at a time. It is impossible to save multiple objects to disk at once.
This button lets you send an object from Backup to recipients.
Clicking this button opens a menu containing the Send to original recipients and Send to other addresses items.
When the Send to original recipients menu item is selected, the application sends the specified object from Backup to recipients of the original message. You can select multiple objects in the list and send them at the same time.
Selecting the Send to other addresses menu item opens the Send Backup object window in which you can specify any email addresses. The Backup object will be sent to the specified addresses. Only one object can be sent at one time.
After they are sent, objects are not deleted from Backup and are not re-scanned by the application.
This functionality is available to users who have been included into the Kse Administrators or Kse AV Security Officers groups.
This button lets you change the set of table columns displayed.
Clicking this button opens a window with a list of available table columns. You can change the set of columns shown in the table by selecting or clearing check boxes opposite the column names.
The table lists objects currently in Backup.
The table contains the following columns:
- From. Contents of the "From" field of a message.
- To. Contents of the "To" and "Bcc" fields of a message.
- Copy. Contents of the "Cc" field of a message.
- Subject. Contents of the "Subject" field of a message.
- Module. Name of the module that moved the object to Backup: Anti-Virus, Anti-Spam, Anti-Phishing, or Attachment and Content Filtering.
- Status. Object scanning result.
- Received. Message receipt time in the format corresponding to the locale settings of the operating system on the recipient's computer. Shows the path only for a Microsoft Exchange Server deployed in the Mailbox role.
- Sent. Message sending date and time in the format corresponding to the locale settings of the operating system on the sender's computer.
- Size. Object size, in bytes.
- Detection. Name of the threat found in the object (provided as a link to the virus description at www.viruslist.com).
- Path. The path to the folder on the Microsoft Exchange server in which the infected object was detected. Shows the path only for a Microsoft Exchange Server deployed in the Mailbox role.
- Object type. Object type: message, message text, or attachment.
- Database release date. The release date of the databases of Anti-Virus and Anti-Spam used to scan the object at the time when it was moved to Backup.
- Message ID. Message ID. This corresponds to the Message-Id field of the message header.
- Object name. Name of the object.
- Server name. Name of the Microsoft Exchange Server where the object was placed in Backup.
- DAG name. The name of Microsoft Exchange Database Availability Group (DAG). Contains a value only in the case of a configuration with a Microsoft Exchange DAG.
- Sender type. Sender type assigned to the message by the application (External, Internal).
By default, the following columns are displayed in the table: From, To, Subject, Status, and Received.
You can change the set of table columns and the order in which they appear by adding or removing columns and by drag-and-dropping column headers.
You can sort the contents of columns in ascending or descending order by left-clicking their headers.
Buttons in the bottom right corner of the workspace for navigating the list of Backup objects in the table.
The buttons with double arrows take you to the first and last pages of the list, respectively. The single arrow buttons turn pages one by one. The entry field lets you enter the number of the page that you want to go to.