Application rules / Group rules

Settings

Description

File

(only in the Application rules window)

Reference information about an application and about the application's executable file. Kaspersky Small Office Security receives information about an application from the application's executable file and from Kaspersky Security Network.

Files and system registry

Rules for accessing system registry keys and files related to operation of the operating system or to your personal data.

The individual access settings for read, write, create, and delete operations can be defined independently by using the menu in the cells of the corresponding table columns. The menu items are described in the Intrusion Prevention rules section.

Rights

Rights to access operating system resources and processes, and startup rights. You can set access rights by using the menu in the cells of the Action column. The menu items are described in the Intrusion Prevention rules section.

Network rules

Rules applied by Kaspersky Small Office Security to regulate the network activity of an application or application group.

By default, the list displays the predefined application network rules that are recommended by Kaspersky experts. You cannot delete or edit predefined network rules (except changing the action in the Permission column; please refer to the description of available actions in the Intrusion Prevention rules section).

When adding or editing a rule, you can define the following settings:

  • Action:
    • Allow. Kaspersky Small Office Security allows the network connection.
    • Block. Kaspersky Small Office Security blocks the network connection.
    • Ask user. If the Perform recommended actions automatically check box is cleared under SettingsSecurity settingsExclusions and actions on object detection, Kaspersky Small Office Security asks the user to decide whether or not to allow or deny the network connection. If the check box is selected, the action is chosen automatically. You can follow the footnote in the application window to read about exactly which action will be selected.
  • Name.
  • Direction:
    • Inbound. Kaspersky Small Office Security applies the rule to network connections opened by a remote computer.
    • Outbound. Kaspersky Small Office Security applies the rule to the network connection that was opened by your computer.
    • Inbound / Outbound. Kaspersky Small Office Security applies the rule both to inbound and outbound data packets or streams, regardless of which computer (your computer or a remote computer) initiated the network connection.
  • Protocol.
  • ICMP settings. You can specify the type and code of data packets to be scanned. The settings section is available if the ICMP or ICMPv6 protocols are selected.
  • Remote ports (ports of a remote computer).
  • Local ports (ports of your computer).

You can specify a range of remote or local ports (for example, 6660–7000), list multiple ports separated by commas, or combine both methods (for example, 80–83,443,1080).

  • Address:
    • Any address.
    • Subnet addresses. Kaspersky Small Office Security applies the rule to IP addresses of all networks that are currently connected and are of the specified type (Public, Local or Trusted). The network type can be selected from the drop-down list that is displayed below if the Subnet addresses option is selected.
    • Addresses from the list. Kaspersky Small Office Security applies the rule to IP addresses within the specified range. You can specify IP addresses in the Remote address field, which is displayed below if the Addresses from the list option is selected.
  • Network adapters traversed by network packets.
  • Use of TTL. Kaspersky Small Office Security controls the transmission of network packets whose time to live (TTL) does not exceed the specified value.
  • Logging events to Kaspersky Small Office Security report.

To quickly add a rule, you can select one of the predefined templates in the drop-down list in the lower part of the window.

Exclusions

(only in the Application rules window)

You can select rules that will be used to exclude an application from scans:

  • Do not scan opened files.
  • Do not monitor application activity. Intrusion Prevention does not monitor any application activity.
  • Do not inherit restrictions from the (application’s) parent process. If restrictions of a parent process or application are not inherited, application activity is monitored according to your defined rules or according to the rules of the trust group to which the application belongs.
  • Do not monitor the activity of child applications.
  • Do not block interaction with Kaspersky Small Office Security interface. The application is allowed to manage Kaspersky Small Office Security by using its graphical interface. You may need to allow the application to manage the interface of Kaspersky Small Office Security when using a remote desktop connection application or an application supporting the operation of a data input device. Examples of such devices include touch pads and graphic tablets.
  • Do not scan all traffic (or encrypted traffic). Depending on the selected option (Do not scan all traffic or Do not scan encrypted traffic), Kaspersky Small Office Security excludes all network traffic of the application or traffic transmitted over SSL from being scanned. The value of this setting does not affect Firewall operation: Firewall scans application traffic in accordance with Firewall settings. Exclusions affect Mail Anti-Virus, and Safe Browsing. You can specify the IP addresses or network ports to which the traffic control restriction must apply.

History

(only in the Application rules window)

Reference information about actions taken on the application, such as starting the application or assigning a trust group.

Page top