To configure the Driver Interceptor mode:
Scanning is available only if the HTTPS port is open.
All versions are selected by default. Moreover, the TLS 1.0 option cannot be disabled.
Note, that you can use the TLS protocol in the Traffic Security task configuration only on protected devices running Microsoft Windows 7 or later, Microsoft Windows Server 2008 R2 or later.
If the Do not trust web-servers with invalid certificate check box is selected, Kaspersky Security for Windows Server blocks all connections with invalid certificates and also all connections with self signed certificate.
The Interception area window opens.
Port is included in the interception area.
By default, Kaspersky Security for Windows Server intercepts traffic that is transferred via the following ports: 80, 8080, 3128, 443.
If you run Traffic Security task in Driver Interceptor mode with the Intercept all option enabled, make sure to configure the Kaspersky Security Center Administration Server to use the default port (13299) for connection with the Kaspersky Security Center Web Console (for more information, refer to Kaspersky Security Center Online Help), or, if you use a custom port, make sure to add this port to the Traffic Security task's list of excluded ports. Otherwise, Traffic Security blocks the connection from the Kaspersky Security Center Web Console to the Kaspersky Security Center Administration Server.
Port is excluded from the area.
By default, Kaspersky Security for Windows Server excludes ports which are used by other applications and might cause issues when attempting to read data transferred via encrypted connection: 3389, 1723, 13291, 13299.
The standard Open windows is displayed.
The task mode configuration is saved.
Page top