Kaspersky Web Traffic Security

Kaspersky Web Traffic Security (hereinafter also referred to as "the application" or "KWTS") is a solution designed for protecting HTTP-, HTTPS-, and FTP traffic passing through a proxy server.

The application protects users of a corporate network when accessing web resources. For example, it deletes malware and other threats from the data stream that enters the corporate network via the HTTP(S) and FTP protocols, blocks infected and phishing websites, and controls access to web resources based on web resource categories and content types.

The application is developed for corporate users.

Kaspersky Web Traffic Security:

Kaspersky Web Traffic Security is compliant with the General Data Protection Regulation (GDPR) and applicable European Union laws on confidential information, personal data, and data protection.

See also

Licensing the application

Scaling Kaspersky Web Traffic Security

Installation and initial configuration of the application from an RPM or DEB package

Installation and initial configuration of the application deployed from an ISO image

Getting started with the application

Monitoring application operation


Kaspersky Web Traffic Security event log

Using traffic processing rules

Managing workspaces

Working with roles and user accounts

Managing the cluster

Protecting network traffic

ICAP server settings

Block page

Exporting and importing settings

Upgrading the application from version 6.0 to version 6.1

Installing update packages

Installing the kwts_upgrade_6.1.0.4762_os_security_march_2023 update package

Installing the kwts_upgrade_6.1.0.4762_os_security_december_2023 update package

Configuring the server time

Configuring proxy server connection settings

Updating Kaspersky Web Traffic Security databases

Participating in Kaspersky Security Network and using Kaspersky Private Security Network

Connecting to a LDAP server

Configuring integration with Kaspersky Anti Targeted Attack Platform

Syslog event log

Application management over the SNMP protocol

Single Sign-On authentication

Managing the settings of a built-in proxy server in the application web interface

Decrypting TLS/SSL connections

Sources of information about the application

Publishing application events to a SIEM system

Contacting the Technical Support

Appendix 1. Installing and configuring the Squid service

Appendix 2. Configuring integration of the Squid service with Active Directory

Appendix 3. Configuring ICAP balancing using HAProxy

Appendix 4. MIME types of objects

Appendix 5. URL normalization

Appendix 6. Website categories

Appendix 7. Physical processor core bandwidth values depending on the type of proxy server and the required protection level

Appendix 8. Virtual processor bandwidth values depending on the type of proxy server and the required protection level

AO Kaspersky Lab

Information about third-party code

Trademark notices

Page top