Managing Kaspersky Endpoint Agent for Windows
August 12, 2024
ID 247330
Kaspersky Endpoint Agent is an application that is installed on individual devices in the corporate IT infrastructure. The application continuously monitors processes running on those devices, active network connections, and files that are being modified.
Kaspersky Endpoint Agent enables the interaction of the protected device with other Kaspersky solutions for detection of complex threats, such as targeted attacks.
When the integration of Kaspersky Endpoint Agent with Kaspersky Anti Targeted Attack Platform is configured, the application runs tasks, applies parameters coming from Kaspersky Anti Targeted Attack Platform, and sends telemetry from the protected device to the KATA Central Node server. For more details about what Kaspersky Endpoint Agent can do when integrated with Kaspersky Anti Targeted Attack Platform, see the Operating principle of the application section.
For details about managing Kaspersky Endpoint Agent, see the Online Help of the application:
- Application activation
- Installing and removing the application.
- Managing Kaspersky Endpoint Agent settings using the Kaspersky Security Center Administration Console and the Kaspersky Security Center Web Console:
- Managing policies
- Managing tasks
- Opening the settings window
- Configuring security settings
- Configuring the connection of Kaspersky Endpoint Agent with a proxy server
- Configuring Kaspersky Security Center as a proxy server to activate Kaspersky Endpoint Agent
- Configuring KSN usage in Kaspersky Endpoint Agent
- Configuring storage settings in Kaspersky Endpoint Agent
- Configuring failure diagnostics
- Managing Kaspersky Endpoint Agent using the command line interface:
- Activation management
- Authentication management
- Configuring tracing
- Configuring the creation of dumps of Kaspersky Endpoint Agent processes
- Viewing information about quarantine settings and quarantined objects
- Actions for quarantined objects
- Running Kaspersky Endpoint Agent database and module updates
- Starting, stopping and viewing the current application status
- Password protection of the application
- Protecting application services with the PPL technology
- Managing self-defense settings
- Managing Standard IOC Scan tasks
- Managing file and process scanning in accordance with YARA rules
- Creating a memory dump
- Creating a disk dump