Contents
Managing the Real-Time File Protection task via the Administration Plug-in
In this section, learn how to navigate the Administration Plug-In interface and configure task settings for one or all protected devices on the network.
Opening policy settings for the Real-Time File Protection task
To open the Real-Time File Protection task settings via the Kaspersky Security Center policy:
- Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
- Select the administration group for which you want to configure the task.
- Select the Policies tab.
- Double-click the policy name you want to configure.
- In the Properties: <Policy name> window that opens, select the Real-time server protection section.
- Click the Settings button in the Real-Time File Protection subsection.
The Real-time file protection window opens.
If a protected device is being managed by an active Kaspersky Security Center policy and this policy blocks changes to the application settings, these settings cannot be edited via the Application Console.
Page topOpening the Real-Time File Protection task properties
To open the Real-Time File Protection task settings window for a single network device:
- Expand the Managed devices node in the Kaspersky Security Center Administration Console tree.
- Select the administration group for which you want to configure the task.
- Select the Devices tab.
- Open the Properties: <Protected device name> window in one of the following ways:
- Double-click the name of the protected device.
- Select the Properties item in the context menu of the protected device.
The Properties: <Protected device name> window opens.
- In the Tasks section, select the Real-Time File Protection task.
- Click the Properties button.
The Properties: Real-Time File Protection window opens.
Configuring the Real-Time File Protection task
To configure the Real-Time File Protection task settings:
- Open the Real-time file protection window.
- Configure the following task settings:
- On the General tab:
- On the Task management tab:
- Select the Protection scope tab and do the following:
- Click the Add or Edit button to edit the protection scope.
- In the window that opens, choose what you want to include in the task protection scope:
- Predefined scope
- Disk, folder or network location
- File
- Select one of the predefined security levels or manually configure the protection settings.
- In the window that opens, choose what you want to include in the task protection scope:
- Click the Add or Edit button to edit the protection scope.
- Click OK in the Real-time file protection window.
Kaspersky Security for Windows Server immediately applies the new settings to a running task. The date and time when the settings were modified, and the values of task settings before and after modification, are saved in the system audit log.
Selecting the protection mode
In the Real-Time File Protection task, the protection mode can be selected. The Objects protection mode section lets you specify the type of access attempts for which Kaspersky Security for Windows Server scans objects.
The value of the Objects protection mode setting applies to the entire protection scope specified in the task. You cannot specify different values for the setting for individual nodes within the protection scope.
To select the protection mode:
- Open the Real-time file protection window.
- In the window that opens, open the General tab and select the protection mode that you want to set:
- Click OK.
The selected protection mode will take effect.
Page topConfiguring Heuristic Analyzer and integration with other application components
To start the KSN Usage task, you must accept the Kaspersky Security Network Statement.
To configure Heuristic Analyzer and integration with other components:
- Open the Real-time file protection window.
- On the General tab, clear or select the check box.
- If necessary, adjust the level of analysis using the .
- In the Integration with other components section, configure the following settings:
- Select or clear the check box.
- Select or clear the check box.
The Send data about scanned files check box must be selected in the KSN Usage task settings.
- Select or clear the Block access to network shared resources for the hosts that show malicious activity check box.
- Select or clear the check box.
- Select or clear the check box.
The Kaspersky Sandbox functionality does not work if Kaspersky Endpoint Agent is not installed on the protected device.
The running Traffic Security task might obstruct the use of Kaspersky Sandbox. To use the Traffic Security task and Kaspersky Sandbox on the same protected device, restart Traffic Security task after the installation of Kaspersky Security for Windows Server and Kaspersky Endpoint Agent.
- Click OK.
The configured task settings are applied immediately to a running task. If the task is not running, the modified settings are applied at next start.
Page topConfiguring the task start schedule settings
You can configure the start schedule for local system and custom tasks in the Application Console. You cannot configure a start schedule for group tasks.
To configure group task start schedule settings:
- In the Kaspersky Security Center Administration Console tree, expand the Managed devices node.
- Select the group that the protected device belongs to.
- In the details pane, select the Tasks tab.
- Open the Properties: <Task name> window in one of the following ways:
- Double-click the name of the task.
- Open the context menu of the task name and select the Properties item.
- Select the Schedule section.
- In the Schedule settings block, select the Run by schedule check box.
Fields with the schedule settings for the On-Demand Scan and Update tasks are unavailable if scheduled start of these tasks is blocked by a Kaspersky Security Center policy.
- Configure schedule settings in accordance with your requirements. To do this, perform the following actions:
- In the Frequency list, select one of the following values:
- Hourly, if you want the task to run at intervals of a specified number of hours; specify the number of hours in the Every <number> hour(s) field.
- Daily, if you want the task to run at intervals of a specified number of days; specify the number of days in the Every <number> day(s) field.
- Weekly, if you want the task to run at intervals of a specified number of weeks; specify the number of weeks in the Every <number> week(s) field. Specify the days of the week on which the task will be started (by default the task runs on Mondays).
- At application launch, if you want the task to run every time Kaspersky Security for Windows Server starts.
- After application database update, if you want the task to run after every update of the application databases.
- Specify the time for the first task start in the Start time field.
- In the Start date field, specify the date from which the schedule applies.
After you have specified the task start frequency, the time of the first task start, and the date from which the schedule applies, the estimated time for the next task start will appear in the top part of the window in the Next start field. The estimated time of the next task start will be updated and displayed each time you open the Task settings window on the Schedule tab.
The Blocked by policy value is displayed in the Next start field if the active policy settings of Kaspersky Security Center prohibit start of scheduled system tasks.
- In the Frequency list, select one of the following values:
- Use the Advanced tab to configure the following schedule settings in accordance with your requirements.
- In the Task stop settings section:
- Select the Duration check box and, in the fields to the right, enter the maximum number of hours and minutes of task execution.
- Select the Pause from check box and, in the fields to the right, enter the start and end values of a time interval under 24 hours during which task execution will be paused.
- In the Advanced settings section:
- Select the Cancel schedule from check box and specify the date from which the schedule will cease to apply.
- Select the Run skipped tasks check box to enable the start of skipped tasks.
- Select the Randomize the task start time within the interval of check box and specify a value in minutes.
- In the Task stop settings section:
- Click OK.
- Click the Apply button to save the task start settings.
If you want to configure application settings for a single task using Kaspersky Security Center, perform the steps described in Section "Configuring local tasks in the Application settings window of the Kaspersky Security Center".
Page topCreating and configuring the task protection scope
To create and configure the task protection scope via the Kaspersky Security Center:
- Open the Real-time file protection window.
- Select the Protection scope tab.
- All items already protected by the task are listed in the Protection scope table.
- Click the Add button to add new item to the list.
The Add objects to protection scope window opens.
- Select an object type to add it to a protection scope:
- Predefined scope - to include one of the predefined scopes in the protection scope on the device. Then in the drop-down list, select the desired protection scope.
- Disk, folder or network location - to include individual drive, folder or a network object in the protection scope. Then select the desired protection scope by clicking the Browse button.
- File - to include an individual file in the protection scope. Then select the desired protection scope by clicking the Browse button.
You cannot add an object to a protection scope if it has already been added as an exclusion from a protection scope.
- To exclude individual items from the protection scope, clear check boxes next to the names of these items or take the following steps:
- Open the context menu of the protection scope by right-clicking it.
- In the context menu, select the Add exclusion option.
- In the Add exclusion window, select an object type that you want to add as an exclusion from the protection scope following the procedure used when adding an object to the protection scope.
- To modify the protection scope or an existing exclusion, select the Edit scope option in the context menu of the desired protection scope.
- To hide a previously added protection scope or an exclusion in the list of network file resources, select the Remove scope option in the context menu of the desired protection scope.
A protection scope is removed from the Real-Time File Protection task scope when it is removed from the network file resource list.
- Click OK.
The Protection scope settings window closes. Your newly configured settings are saved.
The Real-Time File Protection task can be started if at least one of the device’s file resource nodes is included in a protection scope.
Page topSelecting predefined security levels for On-Demand Scan tasks
You can apply one of the following three predefined security levels to a node selected in the device's file resource list: Maximum performance, Recommended, and Maximum protection.
To select one of the predefined security levels:
- Open the Properties: Real-Time File Protection window.
- Select the Protection scope tab.
- In the protected device's list, select an item included in the protection scope in order to set a predefined security level.
- Click the Configure button.
The Real-time file protection settings window opens.
- On the Security level, tab select the security level to be applied.
The window displays the list of security settings corresponding to the security level selected.
- Click OK.
- Click OK in the Properties: Real-Time File Protection window.
Configured task settings are saved and applied immediately to a running task. If the task is not running, the modified settings are applied at next start.
Configuring security settings manually
By default, the Real-Time File Protection task uses common security settings for the entire protection scope. These settings correspond to the Recommended predefined security level.
The default values of security settings can be modified by configuring them as common settings for the entire protection scope or as different settings for individual items in the device's file resource list or nodes in the tree.
To configure the security settings of the selected node manually:
- Open the Real-time file protection window.
- On the Protection scope tab, select the node whose security settings you want to configure, and click Configure.
The Real-time file protection settings window opens.
- On the Security level tab, click the Settings button to customize the configuration.
- You can configure custom security settings for the selected node in accordance with your requirements:
- Click OK in the Real-time file protection window.
The new protection scope settings are saved.
Configuring general task settings
To configure the general security settings of the Real-Time File Protection task:
- Open the Real-time file protection settings window.
- Select the General tab.
- In the Objects protection section, specify the objects types that you want to include in the protection scope:
- In the Performance group box, select or clear the check box.
To switch between available options when the check box is cleared, click on the All / Only new link for each of the compound object types.
- In the Compound objects protection section, specify the compound objects that you want to include in the protection scope:
- Click Save.
The new task configuration will be saved.
Page topConfiguring actions
To configure actions on infected and other detected objects during the Real-Time File Protection task:
- Open the Real-time file protection settings window.
- Select the Actions tab.
- Select the action to be performed on infected and other detected objects:
- .
- .
- Perform additional action.
Select the action from the drop-down list:
- Disinfect.
- Disinfect. Remove if disinfection fails.
- .
- .
- Select the action to be performed on probably infected objects:
- Notify only.
- Block access.
- Perform additional action.
Select the action from the drop-down list:
- Quarantine.
- Remove.
- Recommended.
- Configure actions to be performed on objects depending on the type of object detected:
- Clear or select the check box.
- Click the Settings button.
- In the window that opens, select a primary action and a secondary action (to be performed if the primary action fails) for each type of detected object.
- Click OK.
- Select the action to perform on unmodifiable compound files: select or clear the check box.
- Click Save.
The new task configuration will be saved.
Page topConfiguring performance
To configure performance settings for the Real-Time File Protection task:
- Open the Real-time file protection settings window.
- Select the Performance tab.
- In the Exclusions section:
- Clear or select the check box.
- Clear or select the check box.
- Click the Edit button for each setting to add exclusions.
- In the Advanced settings section: