Kaspersky Web Traffic Security

Kaspersky Web Traffic Security (hereinafter also referred to as "the application" or "KWTS") is a solution designed for protecting HTTP, HTTPS, and FTP traffic passing through a proxy server.

The application protects users of a corporate network when accessing web resources. For example, it removes malware and other threatening software from the data stream entering the corporate network via the HTTP(S) and FTP protocols, blocks infected and phishing websites, and controls access to web resources based on web resource categories and content types.

The solution is intended for corporate users.

Kaspersky Web Traffic Security:

Kaspersky Web Traffic Security is compliant with the General Data Protection Regulation (GDPR) and applicable European Union laws on confidential information, personal data, and data protection.

See also

Licensing the application

Scaling Kaspersky Web Traffic Security

Installation and initial configuration of the application from an RPM or DEB package

Installation and initial configuration of the application deployed from an ISO image

Migrating Kaspersky Web Traffic Security from CentOS to Rocky Linux

Getting started with the application

Monitoring of application operation

Reports

Kaspersky Web Traffic Security event log

Using traffic processing rules

Managing workspaces

Working with roles and user accounts

Managing the cluster

Protecting network traffic

ICAP server settings

Block page

Exporting and importing settings

Upgrading the application from version 6.0 to version 6.1

Installing update packages

Installing the kwts_upgrade_6.1.0.4762_os_security_november_2024 update package

Configuring the server time

Configuring proxy server connection settings

Updating Kaspersky Web Traffic Security databases

Participating in Kaspersky Security Network and using Kaspersky Private Security Network

Connecting to a LDAP server

Configuring integration with Kaspersky Anti Targeted Attack Platform

Syslog event log

Managing the application over SNMP

Single Sign-On authentication

Managing the settings of the built-in proxy server in the application web interface

Decrypting TLS/SSL connections

Sources of information about the application

Publishing application events to a SIEM system

Contacting the Technical Support

Appendix 1. Installing and configuring the Squid service

Appendix 2. Configuring integration of the Squid service with Active Directory

Appendix 3. Configuring ICAP balancing using HAProxy

Appendix 4. MIME types of objects

Appendix 5. URL normalization

Appendix 6. Website categories

Appendix 7. Physical processor core bandwidth values depending on the type of proxy server and the required protection level

Appendix 8. Virtual processor bandwidth values depending on the type of proxy server and the required protection level

AO Kaspersky Lab

Information about third-party code

Trademark notices

Page top