Scenario: Configuring network protection

The quick start wizard creates policies and tasks with the default settings. These settings may turn out to be sub-optimal or even disallowed by the organization. Therefore, we recommend that you fine-tune these policies and tasks and create other policies and tasks, if they are necessary for your network.

Prerequisites

Before you start, make sure that you have completed the Kaspersky Security Center Cloud Console initial configuration scenario, including the quick start wizard.

When the quick start wizard is running, the following policies and tasks are created in the Managed devices administration group:

Stages

Configuring network protection proceeds in stages:

  1. Setup and propagation of Kaspersky application policies and policy profiles

    To configure and propagate settings for Kaspersky applications installed on the managed devices, you can use two different security management approaches: device-centric or user-centric. You can also combine these two approaches.

  2. Configuring tasks for remote management of Kaspersky applications

    Check the tasks created with the quick start wizard and fine-tune them, if necessary.

    How-to instructions:

    If necessary, create additional tasks to manage the Kaspersky applications installed on the client devices.

  3. Evaluating and limiting the event load on the database

    Information about events during the operation of managed applications is transferred from a client device and registered in the Administration Server database. To reduce the load on the Administration Server, evaluate and limit the maximum number of events that can be stored in the database.

    How-to instructions: Setting the maximum number of events.

Results

Upon completion of this scenario, your network will be protected by configuration of Kaspersky applications, tasks, and events received by the Administration Server:

When the network protection configuration is complete, you can proceed to configuring regular updates to Kaspersky databases and applications.

See also:

About device-centric and user-centric security management approaches

Policy setup and propagation: Device-centric approach

Policy setup and propagation: User-centric approach

Manual setup of the Kaspersky Endpoint Security policy

Manual setup of the group update task for Kaspersky Endpoint Security

Tasks

Managing client devices

Policies and policy profiles

Data encryption and protection

Users and user roles

Managing object revisions

Deletion of objects

Page top