Network Agent policy settings

Expand all | Collapse all

To configure the Network Agent policy:

  1. In the main menu, go to DEVICESPOLICIES & PROFILES.
  2. Click the name of the Network Agent policy.

The properties window of the Network Agent policy opens.

General

On this tab, you can modify the policy status and specify the inheritance of policy settings:

Event configuration

On this tab, you can configure event logging and event notification. Events are distributed according to importance level in the following sections on the Event configuration tab:

In each section, the event type list shows the types of events and the default event storage term on the Administration Server (in days). After you click the event type, you can specify the settings of event logging and notifications about events selected in the list. By default, common notification settings specified for the entire Administration Server are used for all event types. However, you can change specific settings for required event types.

For example, in the Warning section, you can configure the Incident has occurred event type. Such events may happen, for instance, when the free disk space of a distribution point is less than 2 GB (at least 4 GB are required to install applications and download updates remotely). To configure the Incident has occurred event, click it and specify where to store the occurred events and how to notify about them.

If Network Agent detected an incident, you can manage this incident by using the settings of a managed device.

Application settings

Settings

In the Settings section, you can configure the Network Agent policy:

Repositories

In the Repositories section, you can select the types of objects whose details will be sent from Network Agent to Administration Server. If modification of some settings in this section is prohibited by the Network Agent policy, you cannot modify these settings.

Software updates and vulnerabilities

In the Software updates and vulnerabilities section, you can configure search and distribution of Windows updates, as well as enable scanning of executable files for vulnerabilities. The settings in the Software updates and vulnerabilities section are available only on devices running Windows:

Restart management

In the Restart management section, you can specify the action to be performed if the operating system of a managed device has to be restarted for correct use, installation, or uninstallation of an application. The settings in the Restart management section are available only on devices running Windows:

Windows Desktop Sharing

In the Windows Desktop Sharing section, you can enable and configure the audit of the administrator's actions performed on a remote device when desktop access is shared. The settings in the Windows Desktop Sharing section are available only on devices running Windows:

Manage patches and updates

In the Manage patches and updates section, you can configure download and distribution of updates, as well as installation of patches, on managed devices:

Connectivity

The Connectivity section includes three subsections:

In the Network subsection, you can configure the connection to Administration Server, enable the use of a UDP port, and specify the UDP port number.

In the Connection profiles subsection, you can specify the network location settings and enable out-of-office mode when Administration Server is not available. The settings in the Connection profiles section are available only on devices running Windows and macOS:

In the Connection schedule subsection, you can specify the time intervals during which Network Agent sends data to the Administration Server:

Network polling by distribution points

In the Network polling by distribution points section, you can configure automatic polling of the network. The polling settings are available only on devices running Windows. You can use the following options to enable the polling and set its frequency:

Network settings for distribution points

In the Network settings for distribution points section, you can specify the internet access settings:

KSN Proxy (distribution points)

In the KSN Proxy (distribution points) section, you can configure the application to use the distribution point to forward KSN requests from the managed devices:

Updates (distribution points)

In the Updates (distribution points) section, you can enable the downloading diff files feature, so distribution points take updates in the form of diff files from Kaspersky update servers.

Revision history

On this tab, you can view the list of the policy revisions and roll back changes made to the policy, if necessary.

Feature comparison by the Network Agent operating systems

The table below shows which Network Agent policy settings you can use to configure Network Agent with a specific operating system.

Network Agent policy settings: comparison by operating systems

Policy section

Windows

Mac

Linux

General

Yes

Yes

Yes

Event configuration

Yes

Yes

Yes

Settings

Yes

Yes

Yes

Only the Maximum size of event queue, in MB and Application is allowed to retrieve policy's extended data on device options are available.

Repositories

Yes

No.

Yes

Only the Details of installed applications and Hardware registry details options are available.

Software updates and vulnerabilities

Yes

No.

No.

Restart management

Yes

No.

No.

Windows Desktop Sharing

Yes

No.

No.

Manage patches and updates

Yes

No.

No.

NetworkConnectivity

Yes

Yes

Yes

Except the Open Network Agent ports in Microsoft Windows Firewall option.

NetworkConnection profiles

Yes

Yes

No.

NetworkConnection schedule

Yes

Yes

Yes

Network polling by distribution points

Yes

Only the Windows network, IP ranges, and Active Directory options are available.

No.

Yes

Only the Zeroconf and IP ranges options are available.

Network settings for distribution points

Yes

Yes

Yes

KSN Proxy (distribution points)

Yes

No.

No.

Updates (distribution points)

Yes

No.

Yes

Revision history

Yes

Yes

Yes

See also:

Scenario: Kaspersky applications deployment through Kaspersky Security Center Web Console

Page top