General
In the General section, you can configure the following policy settings:
Event configuration
In the Event configuration section, you can configure settings for the following event categories:
You can use the Properties button to configure the following settings for the selected events:
Application settings
Application Settings
Section |
Options |
Scalability, interface and scan settings |
In the Scalability, interface and scan settings subsection, you can click the Settings button to configure the following settings:
|
Security and reliability |
In the Security and reliability subsection, you can click the Settings button to configure the following settings:
|
Connections |
In the Connections subsection, you can use the Settings button to configure the following proxy server settings for connecting with update servers, activation servers and KSN:
|
Run local system tasks |
In the Run local system tasks subsection, you can use the Settings button to allow or block the start of the following local system tasks according to a schedule configured on protected devices:
|
Supplementary
Supplementary settings
Section |
Options |
Trusted Zone |
Click the Settings button in the Trusted Zone subsection to configure the following Trusted Zone application settings:
|
Removable Drives Scan |
In the Removable Drives Scan subsection, you can use the Settings button to configure scan settings for removable drives. |
User access permissions for application management |
In the User access permissions for application management subsection, you can configure user rights and user group rights to manage Kaspersky Security for Windows Server. |
User access permissions for Kaspersky Security Service management |
In the User access permissions for Kaspersky Security Service management subsection, you can configure user rights and user group rights to manage the Kaspersky Security Service. |
Storages |
In the Storages subsection, click the Settings button to configure the following Quarantine, Backup and Blocked Hosts settings:
|
Real-time Server Protection
Real-Time Server Protection settings
Section |
Options |
Real-Time File Protection |
In the Real-Time File Protection subsection, you can click the Settings button to configure the following task settings:
|
KSN Usage |
In the KSN Usage subsection, you can click the Settings button to configure the following task settings:
|
Traffic Security |
In the Traffic Security subsection, you can click the Settings button to configure the following task settings:
|
Exploit Prevention |
In the Exploit Prevention subsection, you can click the Settings button to configure the following task settings:
|
Script Monitoring |
In the Script Monitoring subsection, click the Settings button to configure the following task run settings:
|
Local activity control
Local Activity Control settings
Section |
Options |
Applications Launch Control |
In the Applications Launch Control subsection, you can use the Settings button to configure the following task settings:
|
Not available under some license types |
In the Not available under some license types subsection, you can click the Settings button to configure the following task settings:
|
Network attached storage protection
Network Attached Storage Protection settings
Section |
Options |
ICAP Network Storage Protection |
In the ICAP Network Storage Protection subsection, you can click the Settings button to configure the following settings:
|
- Form protection scope |
In the - Form protection scope subsection, you can click the Settings button to configure the following settings:
|
Anti-Cryptor for NetApp |
In the Anti-Cryptor for NetApp subsection, you can click the Settings button to configure the following settings:
|
Network activity control
Network activity control settings
Section |
Options |
Firewall Management |
In the Firewall Management subsection, you can click the Settings button to configure the following task settings:
|
Anti-Cryptor |
In the Anti-Cryptor subsection, you can click the Settings button to configure the following task settings:
|
System inspection
System Inspection settings
Section |
Options |
File Integrity Monitor |
In the File Integrity Monitor subsection, you can configure control over changes in files that can signify a security breach on a protected device. |
Log Inspection |
In the Log Inspection section, you can configure protected device integrity monitoring based on the results of an analysis of the Windows Event Log. |
Logs and notifications
Logs and Notifications settings
Section |
Options |
Task logs |
In the Task logs subsection, you can click the Settings button to configure the following settings:
|
Event notifications |
In the Event notifications subsection, you can click the Settings button to configure the following settings:
|
Interaction with Administration Server |
In the Interaction with Administration Server subsection, you can click the Settings button to select the types of objects that Kaspersky Security for Windows Server will report to Administration Server. |
To review detailed information about Network Attached Storage Protection tasks, see Kaspersky Security for Windows Server Implementation Guide for Network Storages Protection.
Revision history
In the Revision history section, you can manage revisions: compare with the current revision or other policy, add descriptions of revisions, save revisions to a file or perform a rollback.
Page top