To ensure maximum security of the IT infrastructure in your organization, you can configure access of users and third-party processes to Kaspersky Endpoint Agent. To do so, you can:
See also
Getting started with Kaspersky Endpoint Agent
Configuring the proxy server connection
Configuring the usage of Kaspersky Security Network
Configuring the integration of Kaspersky Endpoint Agent with Kaspersky Sandbox
Configuring Threat Response actions of Kaspersky Endpoint Agent to respond to threats detected by Kaspersky Sandbox
Configuring Quarantine settings and restoration of objects from Quarantine
Configuring data synchronization with the Administration Server
Managing Kaspersky Endpoint Agent tasks
In this section:
Configuring user permissions
Enabling Password protection
Enabling and disabling Self-Defense