Connection safety

Usage of TLS

We recommend prohibiting insecure connections to Administration Server. For example, you can prohibit connections that use HTTP in the Administration Server settings.

Please note that by default, several HTTP ports of Administration Server are closed. The remaining port is used for the Administration Server Web Server (8060). This port can be limited by the firewall settings of the Administration Server device.

Strict TLS settings

We recommend using TLS protocol version 1.2 and later, and restricting or prohibiting insecure encryption algorithms.

You can configure the encryption protocols (TLS) used by Administration Server. Please note that at the time of the release of a version of Administration Server, the encryption protocol settings are configured by default to ensure secure data transfer.

Prohibition of remote authentication by using Windows accounts

You can use the LP_RestrictRemoteOsAuth flag to prohibit SSPI connections from remote addresses. This flag allows you to prohibit remote authentication on Administration Server by using local or domain Windows accounts.

To switch the LP_RestrictRemoteOsAuth flag to the mode of prohibiting connections from the remote addresses:

  1. Run the Windows command prompt by using administrator rights, and then change your current directory to the directory with the klscflag utility. The klscflag utility is located in the folder where Administration Server is installed. The default installation path is <Disk>:\Program Files (x86)\Kaspersky Lab\Kaspersky Security Center.
  2. Execute the following command in the command line to specify the value of the LP_RestrictRemoteOsAuth flag:

    klscflag.exe -fset -pv .core/.independent -s KLLIM -n LP_RestrictRemoteOsAuth -t d -v 1

  3. Restart the Administration Server service.

The LP_RestrictRemoteOsAuth flag does not work if remote authentication is performed through Kaspersky Security Center Web Console or Administration Console that is installed on the Administration Server device.

Restricting access to the Administration Server database

We recommend restricting access to the Administration Server database. For example, grant access only from the Administration Server device. This reduces the likelihood of the Administration Server database being compromised due to known vulnerabilities.

You can configure the parameters according to the operating instructions of the used database, as well as provide closed ports on firewalls.

Authenticating Microsoft SQL Server

If Kaspersky Security Center uses Microsoft SQL Server as a DBMS, it is necessary to protect Kaspersky Security Center data transferred to or from the database and data stored in the database from unauthorized access. To do this, you must provide secure communication between Kaspersky Security Center and SQL Server. The most reliable way to provide secure communication is to install Kaspersky Security Center and SQL Server on the same device and use the shared memory mechanism for both applications. In all other cases, we recommend that you use an SSL/TLS certificate to authenticate the SQL Server instance.

Generally, Administration Server can address SQL Server through the following providers:

Also, before using TCP/IP, Named Pipes, or Shared memory, make sure that the required protocol is enabled.

Security interaction with an external DBMS

If the DBMS is installed on a separate device during the installation of Administration Server (external DBMS), we recommend configuring the parameters for secure interaction and authentication with this DBMS. For more information about configuring SSL authentication, refer to Authenticating PostgreSQL Server and Scenario: Authenticating MySQL Server.

Configuring an allowlist of IP addresses to connect to Administration Server

By default, Kaspersky Security Center users can log in to Kaspersky Security Center from any device where the MMC-based Administration Console, Kaspersky Security Center Web Console or OpenAPI applications are installed. You can configure Administration Server so that users can connect to it only from devices with allowed IP addresses. For example, if an intruder tries to connect to Kaspersky Security Center through Kaspersky Security Center Web Console Server installed on a device that is not included in the allowlist, he or she will not be able to log in to Kaspersky Security Center.

Configuring an allowlist of IP addresses to connect to Kaspersky Security Center Web Console

By default, Kaspersky Security Center users can connect to Kaspersky Security Center Web Console from any device. On a device with Kaspersky Security Center Web Console installed, you must configure the firewall (built into the operating system or a third-party one) so that users can connect to Kaspersky Security Center Web Console only from allowed IP addresses.

Security of connection to the domain controller during the polling

Administration Server or a Linux distribution point connect to the domain controller over LDAPS to poll the domain. By default, certificate verification is not required when connecting. To enforce certificate verification, set the KLNAG_LDAP_TLS_REQCERT flag to 1. Also, you can specify a custom path to the certificate authority (CA) to access the certificate chain by using the KLNAG_LDAP_SSL_CACERT flag.

Page top