Configuring network traffic scanning in the Administration Console

In the Administration Console, you can configure network traffic scan settings in the policy properties (General settings → Network settings).

Encrypted connections scan settings

Setting

Description

Enable encrypted connection scans

This check box enables or disables encrypted connection scans.

The check box is selected by default.

Settings for encrypted connections

This section contains the encrypted connections scan settings:

  • Visit to a domain with an untrusted certificate specifies the action that the application must perform when a domain with an untrusted certificate is visited:
    • Allow (default value) — Allow connecting to the domain with an untrusted certificate.
    • Block — Block connection to the domain with an untrusted certificate.
  • Visiting a domain with a network traffic scan error specifies the action that the application must perform when a domain with a network traffic scan error is visited:
    • Allow and add domain to exclusions (default value) — Add the domain that resulted in the error to the list of domains with scan errors and do not scan encrypted network traffic when this domain is visited.
    • Block — Block connection to the domain with a scan error.
  • Certificate verification policy is the method the application uses to verify certificates:
    • Local check: the application does not use the internet to verify a certificate.
    • Full check (default value): the application uses the internet to check and download the missing chains that are needed to verify a certificate.

Trusted domains

This group of settings contains the Configure button, which opens the Trusted domains window, where you can configure the list of trusted domain names.

Trusted root certificates

This group of settings contains the Configure button. Clicking this button opens the Trusted root certificates window. In this window, you can configure the list of root certificates that Kaspersky Endpoint Security must consider trusted when scanning encrypted connections.

Traffic interception exclusions

This group of settings contains the Configure button, which you can click to open the Traffic interception exclusions window. In this window, you can manage the settings of connections that the application excludes from traffic interception.

Network ports settings

This group of settings contains the Configure button. Clicking this button opens the Monitored ports window.

Additional settings

This group of settings contains the Configure button, which you can click to open the Traffic interception mode window. In this window, you can configure the traffic interception mode:

  • Use eBPF. If this option is selected, the application uses the eBPF technology to intercept traffic.
  • Use iptables (default). If this option is selected, the application uses the iptables technology to intercept traffic.

To change the traffic interception mode, you need to restart the application.

Page top