- About Kaspersky Security for Windows Server
- What's new
- Sources of information about Kaspersky Security for Windows Server
- Kaspersky Security for Windows Server
- Kaspersky Endpoint Agent
- Installing and removing the application
- Kaspersky Security for Windows Server software component codes for the Windows Installer service
- System changes after Kaspersky Security for Windows Server installation
- Kaspersky Security for Windows Server processes
- Installation and uninstallation settings and command line options for the Windows Installer service
- Kaspersky Security for Windows Server install and uninstall logs
- Installation planning
- Installing and uninstalling the application using a wizard
- Installing using the Setup Wizard
- Kaspersky Security for Windows Server installation
- Kaspersky Security for Windows Server Console installation
- Kaspersky Security Microsoft Outlook Add-in installation
- Advanced settings after installation of the Application Console on another device
- Actions to perform after Kaspersky Security for Windows Server installation
- Modifying the set of components and repairing Kaspersky Security for Windows Server
- Uninstalling using the Setup Wizard
- Installing using the Setup Wizard
- Installing and uninstalling the application from the command line
- About installing and uninstalling Kaspersky Security for Windows Server from command line
- Example commands for installing Kaspersky Security for Windows Server
- Actions to perform after Kaspersky Security for Windows Server installation
- Adding / removing components. Sample commands
- Kaspersky Security for Windows Server uninstallation. Sample commands
- Return codes
- Installing and uninstalling the application using Kaspersky Security Center
- General information about installing via Kaspersky Security Center
- Rights to install or uninstall Kaspersky Security for Windows Server
- Installing Kaspersky Security for Windows Server via Kaspersky Security Center
- Actions to perform after Kaspersky Security for Windows Server installation
- Installing the Application Console via Kaspersky Security Center
- Uninstalling Kaspersky Security for Windows Server via Kaspersky Security Center
- Installing and uninstalling via Active Directory group policies
- Checking Kaspersky Security for Windows Server functions. Using the EICAR test virus
- Application interface
- Application licensing
- About the End User License Agreement
- About the license
- About license certificate
- About the key
- About the key file
- About activation code
- About subscription
- About data provision
- About activating the application through Cloud Console
- Activating the application with a key file
- Activating the application with an activation code
- Viewing information about the current license
- Functional limitations when the license expires
- Renewing the license
- Deleting the key
- Working with the Administration Plug-in
- Managing Kaspersky Security for Windows Server from Kaspersky Security Center
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- About task creation in Kaspersky Security Center
- Creating a task using Kaspersky Security Center
- Configuring local tasks in the Application settings window of the Kaspersky Security Center
- Configuring group tasks in Kaspersky Security Center
- Configuring crash diagnostics settings in Kaspersky Security Center
- Managing task schedules
- Reports in Kaspersky Security Center
- Working with the Kaspersky Security for Windows Server Console
- About the Kaspersky Security for Windows Server Console
- Kaspersky Security for Windows Server Console interface
- Managing Kaspersky Security for Windows Server via the Application Console on another device
- Configuring general application settings via the Application Console
- Managing Kaspersky Security for Windows Server tasks
- Viewing the protection status and Kaspersky Security for Windows Server information
- Working with the Web Plug-in from Web Console and Cloud Console
- Managing Kaspersky Security for Windows Server from Web Console and Cloud Console
- Web Plug-in limitations
- Managing application settings
- Creating and configuring policies
- Creating and configuring tasks using Kaspersky Security Center
- Reports in Kaspersky Security Center
- Compact Diagnostic Interface
- Updating Kaspersky Security for Windows Server databases and software modules
- About Update tasks
- About Software Modules Update
- About Databases Update
- Schemes for updating anti-virus application databases and modules used within an organization
- Configuring Update tasks
- Rolling back Kaspersky Security for Windows Server database updates
- Rolling back application module updates
- Update task statistics
- Isolating objects and copying backups
- Isolating probably infected objects. Quarantine
- Making backup copies of objects. Backup
- Blocking access to network resources. Blocked Hosts
- Event registration. Kaspersky Security for Windows Server logs
- Notification settings
- Starting and stopping Kaspersky Security for Windows Server
- Kaspersky Security for Windows Server self-defense
- About Kaspersky Security for Windows Server self-defense
- Protection from changes to folders with installed Kaspersky Security for Windows Server components
- Protection from changes to Kaspersky Security for Windows Server registry keys
- Registering the Kaspersky Security Service as a protected service
- Managing access permissions for Kaspersky Security for Windows Server functions
- About permissions to manage Kaspersky Security for Windows Server
- About permissions to manage registered services
- About access permissions for the Kaspersky Security Management Service
- About permissions to manage the Kaspersky Security Service
- Managing access permissions via the Administration Plug-in
- Managing access permissions via the Application Console
- Managing access permissions via the Web Plug-in
- Real-Time File Protection
- About the Real-Time File Protection task
- About the task protection scope and security settings
- About virtual protection scopes
- Predefined protection scopes
- About predefined security levels
- File extensions scanned by default in the Real-Time File Protection task
- Default Real-Time File Protection task settings
- Managing the Real-Time File Protection task via the Administration Plug-in
- Managing Real-Time File Protection task via the Application Console
- Managing Real-Time File Protection task via the Web Plug-in
- Script Monitoring
- KSN Usage
- Network Threat Protection
- About the Network Threat Protection task
- Default Network Threat Protection task settings
- Configuring the Network Threat Protection task via the Application Console
- Configuring the Network Threat Protection task via the Administration Plug-in
- Configuring the Network Threat Protection task via the Web Plug-in
- Traffic Security
- About the Traffic Security task
- About Traffic Security rules
- Mail threat protection
- List of categories
- Predefined protection level settings
- Default Traffic Security task settings
- Managing Traffic Security via the Administration Plug-in
- Managing Traffic Security via the Application Console
- Managing Traffic Security via the Web Plug-in
- Anti-Cryptor
- Applications Launch Control
- About the Applications Launch Control task
- About Applications Launch Control rules
- About Software Distribution Control
- About KSN usage for the Applications Launch Control task
- About Applications Launch Control rules generation
- Default Applications Launch Control task settings
- Managing Applications Launch Control via the Administration Plug-in
- Navigation
- Configuring Applications Launch Control task settings
- Configuring Software Distribution Control
- Configuring the Rule Generator for Applications Launch Control task
- Configuring Applications Launch Control rules via the Kaspersky Security Center
- Adding an Applications Launch Control rule
- Enabling the Default Allow mode
- Creating allowing rules from Kaspersky Security Center events
- Importing rules from a Kaspersky Security Center report on blocked applications
- Importing Applications Launch Control rules from an XML file
- Checking application launches
- Creating a Rule Generator for Applications Launch Control task
- Managing Applications Launch Control via the Application Console
- Managing Applications Launch Control via the Web Plug-in
- Device Control
- About Device Control task
- About Device Control rules
- About Device Control rules generation
- About Rule Generator for Device Control task
- Device Control default task settings
- Managing Device Control via the Administration Plug-in
- Navigation
- Configuring Device Control task
- Configuring the Rule Generator for Device Control task
- Configuring Device Control rules via the Kaspersky Security Center
- Creating allowing rules based on system data in a Kaspersky Security Center policy
- Generating rules for connected devices
- Importing rules from the Kaspersky Security Center report on blocked devices
- Creating rules using the Rule Generator for Device Control task
- Adding generated rules to the Device Control rules list
- Managing Device Control via the Application Console
- Navigation
- Configuring Device Control task settings
- Configuring Device Control rules
- Importing Device Control rules from XML file
- Filling rules list basing on Device Control task events
- Adding an allowing rule for one or several external devices
- Removing Device Control rules
- Exporting Device Control rules
- Activating and deactivating of Device Control rules
- Expanding Device Control rules usage scope
- Configuring Rule Generator for Device Control task
- Managing Device Control via the Application Console Web Plug-in
- Firewall Management
- File Integrity Monitor
- Log Inspection
- On-Demand Scan
- About On-Demand Scan tasks
- About the task scan scope and security settings
- Predefined scan scopes
- Online storage file scanning
- About predefined security levels
- About the Removable Drives Scan
- About the Baseline File Integrity Monitor task
- Enabling start of On-Demand Scan task from context menu
- Default On-Demand Scan tasks settings
- Managing On-Demand Scan tasks via the Administration Plug-in
- Managing On-Demand Scan tasks via the Application Console
- Managing On-Demand Scan tasks via the Web Plug-in
- Trusted Zone
- Exploit Prevention
- Hierarchical storage management
- Network Attached Storage Protection
- Integrating Kaspersky Security for Windows Server with network attached storages
- Working with the Kaspersky Security for Windows Server Console
- About the Kaspersky Security for Windows Server Console
- Starting the Kaspersky Security for Windows Server Console from the Start menu
- Kaspersky Security for Windows Server Console window
- Viewing status information for Network Attached Storage Protection
- Managing Network Attached Storage Protection tasks
- Protecting EMC network attached storages of the Celerra / VNX group
- RPC Network Storage Protection
- About the RPC Network Storage Protection
- About scanning symbolic links
- About scanning snapshots and other read-only volumes and folders
- Configuring a connection between an RPC network storage and Kaspersky Security for Windows Server
- Configuring the RPC Network Storage Protection task
- Security levels in the RPC Network Storage Protection task
- About security levels in the RPC Network Storage Protection task
- Applying a preset security level in the RPC Network Storage Protection task
- Manually configuring the security level settings in the RPC Network Storage Protection task
- Using security level settings templates in the RPC Network Storage Protection task
- Viewing statistics of the RPC Network Storage Protection task
- ICAP Network Storage Protection
- About the ICAP Network Storage Protection
- Configuring a connection between an ICAP network storage and Kaspersky Security for Windows Server
- Configuring the ICAP Network Storage Protection task
- Security levels in the ICAP Network Storage Protection task
- Viewing statistics of the ICAP Network Storage Protection task
- Anti-Cryptor for NetApp
- Managing Network Attached Storage Protection tasks from Kaspersky Security Center
- Configuring Network Attached Storage Protection settings using policies
- Configuring Network Attached Storage Protection settings for one server in Kaspersky Security Center
- Manually configuring the security level settings in the RPC Network Storage Protection task
- Manually configuring the security level settings in the ICAP Network Storage Protection task
- Integrating with third-party systems
- Performance counters for System Monitor
- About Kaspersky Security for Windows Server performance counters
- Total number of requests denied
- Total number of requests skipped
- Number of requests not processed because of lack of system resources
- Number of requests sent to be processed
- Average number of file interception dispatcher streams
- Maximum number of file interception dispatcher streams
- Number of elements in the infected objects queue
- Number of objects processed per second
- Kaspersky Security for Windows Server SNMP counters and traps
- Integrating with WMI
- Performance counters for System Monitor
- Working with Kaspersky Security for Windows Server from the command line
- Commands
- Displaying Kaspersky Security for Windows Server command help: KAVSHELL HELP
- Starting and stopping the Kaspersky Security Service KAVSHELL START: KAVSHELL STOP
- Scanning a selected area: KAVSHELL SCAN
- Starting the Critical Areas Scan task: KAVSHELL SCANCRITICAL
- Managing tasks asynchronously: KAVSHELL TASK
- Removing the PPL attribute: KAVSHELL CONFIG
- Starting and stopping Real-Time Server Protection tasks: KAVSHELL RTP
- Managing the Applications Launch Control task: KAVSHELL APPCONTROL /CONFIG
- Rule Generator for Applications Launch Control: KAVSHELL APPCONTROL /GENERATE
- Filling the list of Applications Launch Control rules: KAVSHELL APPCONTROL
- Filling the list of Device Control rules: KAVSHELL DEVCONTROL
- Starting the Database Update task: KAVSHELL UPDATE
- Rolling back Kaspersky Security for Windows Server database updates: KAVSHELL ROLLBACK
- Managing log inspection: KAVSHELL TASK LOG-INSPECTOR
- Activating the application: KAVSHELL LICENSE
- Enabling, configuring and disabling trace logs: KAVSHELL TRACE
- Defragmenting Kaspersky Security for Windows Server log files: KAVSHELL VACUUM
- Cleaning iSwift base: KAVSHELL FBRESET
- Enabling and disabling dump file creation: KAVSHELL DUMP
- Importing settings: KAVSHELL IMPORT
- Exporting settings: KAVSHELL EXPORT
- Integration with Microsoft Operations Management Suite: KAVSHELL OMSINFO
- Managing the Baseline File Integrity Monitor task: KAVSHELL FIM /BASELINE
- Command return codes
- Return code for the KAVSHELL START and KAVSHELL STOP commands
- Return code for KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands
- Return codes for the KAVSHELL TASK LOG-INSPECTOR command
- Return codes for the KAVSHELL TASK command
- Return codes for the KAVSHELL RTP command
- Return codes for the KAVSHELL UPDATE command
- Return codes for the KAVSHELL ROLLBACK command
- Return codes for the KAVSHELL LICENSE command
- Return codes for the KAVSHELL TRACE command
- Return codes for the KAVSHELL FBRESET command
- Return codes for the KAVSHELL DUMP command
- Return codes for the KAVSHELL IMPORT command
- Return codes for the KAVSHELL EXPORT command
- Return codes for the KAVSHELL FIM /BASELINE command
- Commands
- Contacting Technical Support
- Glossary
- Active key
- Administration Server
- Anti-virus databases
- Archive
- Backup
- Disinfection
- Event severity
- False positive
- File mask
- Heuristic analyzer
- Infectable file
- Infected object
- Kaspersky Security Network (KSN)
- License term
- Local task
- OLE object
- Policy
- Protection status
- Quarantine
- Real-time protection
- Security level
- SIEM
- Startup objects
- Task
- Task settings
- Update
- Vulnerability
- Information about third-party code
- Trademark notices
About Applications Launch Control rules generation
You can create lists of Applications Launch Control rules using Kaspersky Security Center tasks and policies simultaneously for all protected devices and groups of protected devices on the corporate network. The scenarios listed below are recommended if the corporate network does not have a reference machine and you are unable to create a list of allowing rules based on applications installed on the template machine.
You can run the Rule Generator for Applications Launch Control task locally via the Application Console to create a list of rules based on the applications running on a single protected device.
The Applications Launch Control component is installed with two preset allowing rules:
- Allowing rule for scripts and Windows Installer packages with a certificate trusted by the operating system.
- Allowing rule for executable files with a certificate trusted by the operating system.
You can create lists of Applications Launch Control rules on the side of Kaspersky Security Center in one of the following ways:
- Using a Rule Generator for Applications Launch Control group task.
Under this scenario, a group task generates its own list of Applications Launch Control rules for each protected device on the network and saves those lists to an XML file in the specified shared folder. The XML file generated by the Rule Generator for Applications Launch Control task contains the allowing rules specified in task settings before the task starts.No rules will be created for applications that are not allowed to start in the specified task settings. The start of such applications is denied by default. You can then manually import the created list of rules into the Applications Launch Control task for the Kaspersky Security Center policy.
You can configure the generated rules to be automatically imported into the list of rules for the Applications Launch Control task.
This scenario is recommended when you need to quickly create lists of Applications Launch Control rules. We recommend that you configure the scheduled launch of the Rule Generator for Applications Launch Control task only if the applied allowing rules include folders and files you know to be safe.
Before using the Applications Launch Control task in the network, make sure that all protected devices have access to a shared folder. If the organization's policy does not provide for the use of a shared folder in the network, we recommend that you start the Rule Generator for Applications Launch Control task on a protected device in the test protected devices group or on a template machine.
- Based on a report of task events generated in Kaspersky Security Center by the Applications Launch Control task running in Statistics only mode.
Under this scenario, Kaspersky Security for Windows Server does not deny the launch of applications. Instead, with Applications Launch Control running in the Statistics only mode, it reports all allowed and denied application launches across all network protected devices in the Events tab of the Administration Server node's workspace in the Kaspersky Security Center. Kaspersky Security Center uses the reports to generate a single list of events in which application launches were denied.
You need to configure the task execution period so that all possible scenarios involving the protected devices and protected device groups, and at least one protected device restart are performed during the specified time period. After the end of the task execution period, you can import application launch data from the saved Kaspersky Security Center event report (TXT format) and generate Applications Launch Control allowing rules for such applications based on this data.
This scenario is recommended if a corporate network includes a large number of protected devices of different type (with a different software installed).
- Based on denied application launch events received through Kaspersky Security Center, without creating and importing a configuration file.
To use this feature, the Applications Launch Control task on the protected device must be running under an active Kaspersky Security Center policy. In this case, all events on the protected device are sent to the Administration Server.
We recommend that you update the list of rules when the set of applications installed on network protected devices changes (for example, when updates are installed or operating systems are reinstalled). We recommend that you generate an updated list of rules by running the Rule Generator for Applications Launch Control task or the Applications Launch Control task in Statistics only mode on protected devices in the test administration group. The test administration group includes the protected devices required to test the launch of new applications before they are installed on network protected devices.
XML files containing lists of allowing rules are created based on an analysis of tasks started on the protected device. To account for all applications used on the network when generating lists of rules you are advised to start the Rule Generator for Applications Launch Control task and the Applications Launch Control task in Statistics only mode on a template machine.
Before generating allowing rules based on the applications launched on a reference machine, make sure that the template machine is secure and there is no malware on it.
Before adding allowing rules, select one of the available rule application modes. The list of Kaspersky Security Center policy rules displays only rules specified by the policy, regardless of the rule application mode. The local rule list includes all applied rules — both local rules and rules added through a policy.