Configuring network protection

This section contains information about manual configuration of policies and tasks, about user roles, about building an administration group structure and hierarchy of tasks.

In this section

Scenario: Configuring network protection

Policy setup and propagation: Device-centric approach

About device-centric and user-centric security management approaches

Manual setup of Kaspersky Endpoint Security policy

Manual setup of the group update task for Kaspersky Endpoint Security

Manual setup of the group task for scanning a device with Kaspersky Endpoint Security

Scheduling the Find vulnerabilities and required updates task

Manual setup of the group task for updates installation and vulnerabilities fix

Setting the maximum number of events in the event repository

Setting the maximum storage period for the information about fixed vulnerabilities

Managing tasks

Creating a hierarchy of administration groups subordinate to a virtual Administration Server

Policies and policy profiles

Device moving rules

Cloning device moving rules

Software categorization

Prerequisites for installing applications on devices of a client organization

Viewing and editing local application settings

See also:

Policy setup and propagation: Device-centric approach

Policy setup and propagation: User-centric approach

Page top