<html><head><meta name="color-scheme" content="light dark"></head><body><pre style="word-wrap: break-word; white-space: pre-wrap;">var Toc = [{"id":1,"o":5022,"text":" KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;15.1 Hilfe ","url":"5022.htm","node":"0","leaf":true},{"id":2,"o":12521,"text":" Neuerungen ","url":"12521.htm","node":"1","leaf":true},{"id":3,"o":3396,"text":" Ãœber Kaspersky Security Center ","url":"3396.htm","node":"2","children":[{"id":4,"o":4531,"text":" Architektur ","url":"4531.htm","node":"2+0","leaf":true},{"id":5,"o":96255,"text":" Hard- und Softwarevoraussetzungen ","url":"96255.htm","node":"2+1","children":[{"id":6,"o":255791,"text":" Anforderungen an den Administrationsserver ","url":"255791.htm","node":"2+1+0","leaf":true},{"id":7,"o":255792,"text":" Anforderungen an die WebÂ&nbsp;Console ","url":"255792.htm","node":"2+1+1","leaf":true},{"id":8,"o":255794,"text":" Anforderungen an Server fÃ¼r mobile GerÃ¤te ","url":"255794.htm","node":"2+1+2","leaf":true},{"id":9,"o":255796,"text":" Anforderungen an die Verwaltungskonsole ","url":"255796.htm","node":"2+1+3","leaf":true},{"id":10,"o":255797,"text":" Anforderungen an den Administrationsagenten ","url":"255797.htm","node":"2+1+4","leaf":true}]},{"id":11,"o":172903,"text":" Kompatible Anwendungen und LÃ¶sungen von Kaspersky ","url":"172903.htm","node":"2+2","leaf":true},{"id":12,"o":209155,"text":" Lizenzen und Funktionen von Kaspersky Security Center 15.1 ","url":"209155.htm","node":"2+3","leaf":true},{"id":13,"o":211939,"text":" Ãœber die KompatibilitÃ¤t der KasperskyÂ&nbsp;SecurityÂ&nbsp;Center-Komponenten ","url":"211939.htm","node":"2+4","leaf":true},{"id":14,"o":211055,"text":" Vergleich von Kaspersky Security Center: Windows-basiert vs. Linux-basiert ","url":"211055.htm","node":"2+5","leaf":true},{"id":15,"o":196993,"text":" Ãœber die KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;CloudÂ&nbsp;Console ","url":"196993.htm","node":"2+6","leaf":true}]},{"id":16,"o":144300,"text":" Kaspersky Security Center 15.1 ","url":"144300.htm","node":"3","children":[{"id":17,"o":3302,"text":" Grundbegriffe ","url":"3302.htm","node":"3+0","children":[{"id":18,"o":3303,"text":" Administrationsserver ","url":"3303.htm","node":"3+0+0","leaf":true},{"id":19,"o":3304,"text":" Hierarchie des Administrationsservers ","url":"3304.htm","node":"3+0+1","leaf":true},{"id":20,"o":30636,"text":" Virtueller Administrationsserver ","url":"30636.htm","node":"3+0+2","leaf":true},{"id":21,"o":65383,"text":" Server fÃ¼r mobile GerÃ¤te ","url":"65383.htm","node":"3+0+3","leaf":true},{"id":22,"o":74647,"text":" Webserver ","url":"74647.htm","node":"3+0+4","leaf":true},{"id":23,"o":3305,"text":" Administrationsagent ","url":"3305.htm","node":"3+0+5","leaf":true},{"id":24,"o":165736,"text":" Administrationsgruppen ","url":"165736.htm","node":"3+0+6","leaf":true},{"id":25,"o":162465,"text":" Verwaltetes GerÃ¤t ","url":"162465.htm","node":"3+0+7","leaf":true},{"id":26,"o":165744,"text":" Nicht zugeordnetes GerÃ¤t ","url":"165744.htm","node":"3+0+8","leaf":true},{"id":27,"o":3307,"text":" Administrator-Arbeitsplatz ","url":"3307.htm","node":"3+0+9","leaf":true},{"id":28,"o":3308,"text":" Verwaltungs-Plug-in ","url":"3308.htm","node":"3+0+10","leaf":true},{"id":29,"o":165761,"text":" Web-Plug-ins zur Verwaltung ","url":"165761.htm","node":"3+0+11","leaf":true},{"id":30,"o":3313,"text":" Richtlinien ","url":"3313.htm","node":"3+0+12","leaf":true},{"id":31,"o":165778,"text":" Richtlinienprofile ","url":"165778.htm","node":"3+0+13","leaf":true},{"id":32,"o":92435,"text":" Aufgaben ","url":"92435.htm","node":"3+0+14","leaf":true},{"id":33,"o":165863,"text":" Aufgabenumfang ","url":"165863.htm","node":"3+0+15","leaf":true},{"id":34,"o":3316,"text":" Interaktion von Richtlinien und lokalen Programmeinstellungen ","url":"3316.htm","node":"3+0+16","leaf":true},{"id":35,"o":98876,"text":" Verteilungspunkt ","url":"98876.htm","node":"3+0+17","leaf":true},{"id":36,"o":204420,"text":" Verbindungs-Gateway ","url":"204420.htm","node":"3+0+18","leaf":true}]},{"id":37,"o":153504,"text":" Hauptinstallationsszenario ","url":"153504.htm","node":"3+1","leaf":true},{"id":38,"o":158830,"text":" Ports, die von KasperskyÂ&nbsp;SecurityÂ&nbsp;Center verwendet werden ","url":"158830.htm","node":"3+2","leaf":true},{"id":39,"o":232137,"text":" Zertifikate fÃ¼r die AusfÃ¼hrung mit Kaspersky Security Center ","url":"232137.htm","node":"3+3","children":[{"id":40,"o":206479,"text":" Ãœber die Zertifikate von Kaspersky Security Center ","url":"206479.htm","node":"3+3+0","leaf":true},{"id":41,"o":3322,"text":" Ãœber das Zertifikat des Administrationsservers ","url":"3322.htm","node":"3+3+1","leaf":true},{"id":42,"o":191451,"text":" Anforderungen an benutzerdefinierte Zertifikate fÃ¼r deren Verwendung in Kaspersky Security Center ","url":"191451.htm","node":"3+3+2","leaf":true},{"id":43,"o":155201,"text":" Szenario: Angeben des benutzerdefinierten Zertifikats des Administrationsservers ","url":"155201.htm","node":"3+3+3","leaf":true},{"id":44,"o":227838,"text":" Zertifikats des Administrationsservers mittels Dienstprogramm klsetsrvcert ersetzen ","url":"227838.htm","node":"3+3+4","leaf":true},{"id":45,"o":227839,"text":" Administrationsagenten mit dem Administrationsserver mittels Dienstprogramm klmover verbinden ","url":"227839.htm","node":"3+3+5","leaf":true},{"id":46,"o":208265,"text":" Webserver-Zertifikat neu ausstellen ","url":"208265.htm","node":"3+3+6","leaf":true}]},{"id":47,"o":183039,"text":" Schemata fÃ¼r Datenverkehr und Portnutzung ","url":"183039.htm","node":"3+4","children":[{"id":48,"o":183040,"text":" Administrationsserver und verwaltete GerÃ¤te im LAN ","url":"183040.htm","node":"3+4+0","leaf":true},{"id":49,"o":183051,"text":" PrimÃ¤rer Administrationsserver im LAN und zwei sekundÃ¤re Administrationsserver ","url":"183051.htm","node":"3+4+1","leaf":true},{"id":50,"o":183056,"text":" Administrationsserver im LAN, verwaltete GerÃ¤te im Internet und Verwendung eines Reverse-Proxys ","url":"183056.htm","node":"3+4+2","leaf":true},{"id":51,"o":183058,"text":" Administrationsserver im LAN, verwaltete GerÃ¤te im Internet; Verwendung eines Verbindungs-Gateways ","url":"183058.htm","node":"3+4+3","leaf":true},{"id":52,"o":183041,"text":" Administrationsserver in der DMZ, verwaltete GerÃ¤te im Internet ","url":"183041.htm","node":"3+4+4","leaf":true},{"id":53,"o":158520,"text":" Interaktion der Komponenten von Kaspersky Security Center und der Sicherheitsanwendungen: weitere Informationen ","url":"158520.htm","node":"3+4+5","children":[{"id":54,"o":158522,"text":" Konventionen fÃ¼r die Interaktionsschemata ","url":"158522.htm","node":"3+4+5+0","leaf":true},{"id":55,"o":158523,"text":" Administrationsserver und DBMS ","url":"158523.htm","node":"3+4+5+1","leaf":true},{"id":56,"o":158545,"text":" Administrationsserver und Verwaltungskonsole ","url":"158545.htm","node":"3+4+5+2","leaf":true},{"id":57,"o":158525,"text":" Administrationsserver und Client-GerÃ¤t: Verwaltung der Sicherheitsanwendung ","url":"158525.htm","node":"3+4+5+3","leaf":true},{"id":58,"o":158532,"text":" Software-Upgrades auf dem Client-GerÃ¤t mithilfe des Verteilungspunkts ","url":"158532.htm","node":"3+4+5+4","leaf":true},{"id":59,"o":158529,"text":" Hierarchie der Administrationsserver: primÃ¤rer Administrationsserver und sekundÃ¤rer Administrationsserver ","url":"158529.htm","node":"3+4+5+5","leaf":true},{"id":60,"o":158530,"text":" Hierarchie der Administrationsserver mit sekundÃ¤rem Administrationsserver in der demilitarisierten Zone ","url":"158530.htm","node":"3+4+5+6","leaf":true},{"id":61,"o":158533,"text":" Administrationsserver, Verbindungs-Gateway im Netzwerksegment und Client-GerÃ¤t ","url":"158533.htm","node":"3+4+5+7","leaf":true},{"id":62,"o":158534,"text":" Administrationsserver und zwei GerÃ¤te in der DMZ: ein Verbindungs-Gateway und ein Client-GerÃ¤t ","url":"158534.htm","node":"3+4+5+8","leaf":true},{"id":63,"o":178949,"text":" Administrationsserver und KasperskyÂ&nbsp;SecurityÂ&nbsp;Center WebÂ&nbsp;Console ","url":"178949.htm","node":"3+4+5+9","leaf":true},{"id":64,"o":158535,"text":" Aktivierung und Verwaltung der Sicherheitsanwendung auf dem mobilen GerÃ¤t ","url":"158535.htm","node":"3+4+5+10","leaf":true}]}]},{"id":65,"o":171268,"text":" BewÃ¤hrte Verfahren zur Bereitstellung ","url":"171268.htm","node":"3+5","children":[{"id":66,"o":245736,"text":" HÃ¤rtungsleitfaden ","url":"245736.htm","node":"3+5+0","children":[{"id":67,"o":245772,"text":" Bereitstellung des Administrationsservers ","url":"245772.htm","node":"3+5+0+0","leaf":true},{"id":68,"o":245773,"text":" Verbindungssicherheit ","url":"245773.htm","node":"3+5+0+1","leaf":true},{"id":69,"o":245774,"text":" Konten und Authentifizierung ","url":"245774.htm","node":"3+5+0+2","leaf":true},{"id":70,"o":245776,"text":" Verwaltung des Schutzes des Administrationsservers ","url":"245776.htm","node":"3+5+0+3","leaf":true},{"id":71,"o":245787,"text":" Verwaltung des Schutzes der Client-GerÃ¤te ","url":"245787.htm","node":"3+5+0+4","leaf":true},{"id":72,"o":246284,"text":" Konfigurieren des Schutzes fÃ¼r verwaltete Programme ","url":"246284.htm","node":"3+5+0+5","leaf":true},{"id":73,"o":245777,"text":" Wartung des Administrationsservers ","url":"245777.htm","node":"3+5+0+6","leaf":true},{"id":74,"o":245779,"text":" EreignisÃ¼bertragung an Systeme von Dritten ","url":"245779.htm","node":"3+5+0+7","leaf":true},{"id":75,"o":275101,"text":" Sicherheitsempfehlungen fÃ¼r Drittanbieter-Informationssysteme ","url":"275101.htm","node":"3+5+0+8","leaf":true},{"id":76,"o":287156,"text":" Empfehlungen fÃ¼r die Verwendung von Kaspersky-Sicherheitsanwendungen ","url":"287156.htm","node":"3+5+0+9","leaf":true}]},{"id":77,"o":171265,"text":" Vorbereitung der Bereitstellung ","url":"171265.htm","node":"3+5+1","children":[{"id":78,"o":92395,"text":" Planung der Bereitstellung fÃ¼r Kaspersky Security Center ","url":"92395.htm","node":"3+5+1+0","children":[{"id":79,"o":54318,"text":" Typische Vorgehensweisen der Bereitstellung ","url":"54318.htm","node":"3+5+1+0+0","leaf":true},{"id":80,"o":159344,"text":" Informationen Ã¼ber die Planung der Verteilung von Kaspersky Security Center in einem Unternehmensnetzwerk ","url":"159344.htm","node":"3+5+1+0+1","leaf":true},{"id":81,"o":61818,"text":" Struktur des Schutzes im Unternehmen auswÃ¤hlen ","url":"61818.htm","node":"3+5+1+0+2","leaf":true},{"id":82,"o":92240,"text":" Typische Konfigurationen von Kaspersky Security Center ","url":"92240.htm","node":"3+5+1+0+3","children":[{"id":83,"o":92241,"text":" Typische Konfiguration: EinzelbÃ¼ro ","url":"92241.htm","node":"3+5+1+0+3+0","leaf":true},{"id":84,"o":92242,"text":" Typische Konfiguration: Mehrere grÃ¶ÃŸere BÃ¼ros mit eigenen Administratoren ","url":"92242.htm","node":"3+5+1+0+3+1","leaf":true},{"id":85,"o":92243,"text":" Typische Konfiguration: Mehrere kleine Remote-BÃ¼ros ","url":"92243.htm","node":"3+5+1+0+3+2","leaf":true}]},{"id":86,"o":92235,"text":" DBMS fÃ¼r den Administrationsserver auswÃ¤hlen ","url":"92235.htm","node":"3+5+1+0+4","leaf":true},{"id":87,"o":210277,"text":" MariaDBÂ&nbsp;x64-Server fÃ¼r die Verwendung mit KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;15.1 konfigurieren ","url":"210277.htm","node":"3+5+1+0+5","leaf":true},{"id":88,"o":220593,"text":" MySQLÂ&nbsp;x64-Server fÃ¼r die Verwendung mit KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;15.1 konfigurieren ","url":"220593.htm","node":"3+5+1+0+6","leaf":true},{"id":89,"o":293140,"text":" PostgresSQL- oder Postgres Pro-Server fÃ¼r die Arbeit mit Kaspersky Security Center 15.1 konfigurieren ","url":"241223.htm","node":"3+5+1+0+7","leaf":true},{"id":90,"o":92393,"text":" Mobile GerÃ¤te mit installiertem Kaspersky Endpoint Security fÃ¼r Android verwalten ","url":"92393.htm","node":"3+5+1+0+8","leaf":true},{"id":91,"o":92236,"text":" Internetzugriff fÃ¼r den Administrationsserver bereitstellen ","url":"92236.htm","node":"3+5+1+0+9","children":[{"id":92,"o":92237,"text":" Internetzugriff: Administrationsserver in einem lokalen Netzwerk ","url":"92237.htm","node":"3+5+1+0+9+0","leaf":true},{"id":93,"o":92238,"text":" Zugriff aus dem Internet: Administrationsserver in der demilitarisierten Zone ","url":"92238.htm","node":"3+5+1+0+9+1","leaf":true},{"id":94,"o":92239,"text":" Zugriff aus dem Internet: Administrationsagent als Verbindungs-Gateway in der demilitarisierten Zone ","url":"92239.htm","node":"3+5+1+0+9+2","leaf":true}]},{"id":95,"o":92244,"text":" Ãœber Verteilungspunkte ","url":"92244.htm","node":"3+5+1+0+10","leaf":true},{"id":96,"o":275856,"text":" Anzahl der Datei-Deskriptoren fÃ¼r den klnagent-Dienst erhÃ¶hen ","url":"275856.htm","node":"3+5+1+0+11","leaf":true},{"id":97,"o":154282,"text":" Anzahl und Konfiguration der Verteilungspunkte bestimmen ","url":"154282.htm","node":"3+5+1+0+12","leaf":true},{"id":98,"o":155205,"text":" Hierarchie des Administrationsservers ","url":"155205.htm","node":"3+5+1+0+13","leaf":true},{"id":99,"o":92246,"text":" Virtuelle Administrationsserver ","url":"92246.htm","node":"3+5+1+0+14","leaf":true},{"id":100,"o":159736,"text":" Informationen zu EinschrÃ¤nkungen von Kaspersky Security Center ","url":"159736.htm","node":"3+5+1+0+15","leaf":true},{"id":101,"o":11961,"text":" Netzwerkbelastung ","url":"11961.htm","node":"3+5+1+0+16","children":[{"id":102,"o":11962,"text":" Erstmalige Bereitstellung des Antiviren-Schutzes ","url":"11962.htm","node":"3+5+1+0+16+0","leaf":true},{"id":103,"o":11979,"text":" Erstmaliges Update der Antiviren-Datenbanken ","url":"11979.htm","node":"3+5+1+0+16+1","leaf":true},{"id":104,"o":11982,"text":" Synchronisierung des Clients mit dem Administrationsserver ","url":"11982.htm","node":"3+5+1+0+16+2","leaf":true},{"id":105,"o":11984,"text":" ZusÃ¤tzliches Update der Antiviren-Datenbanken ","url":"11984.htm","node":"3+5+1+0+16+3","leaf":true},{"id":106,"o":11986,"text":" Verarbeitung von Ereignissen der Clients durch Administrationsserver ","url":"11986.htm","node":"3+5+1+0+16+4","leaf":true},{"id":107,"o":11981,"text":" Datenverkehr in 24 Stunden ","url":"11981.htm","node":"3+5+1+0+16+5","leaf":true}]}]},{"id":108,"o":92542,"text":" Vorbereitung auf die Verwaltung mobiler GerÃ¤te ","url":"92542.htm","node":"3+5+1+1","children":[{"id":109,"o":92389,"text":" iOS MDM-Server ","url":"92389.htm","node":"3+5+1+1+0","children":[{"id":110,"o":92391,"text":" Typische Konfiguration: Kaspersky Device Management fÃ¼r iOS in der DMZ ","url":"92391.htm","node":"3+5+1+1+0+0","leaf":true},{"id":111,"o":92392,"text":" Typische Konfiguration: iOS MDM-Server im lokalen Netzwerk des Unternehmens ","url":"92392.htm","node":"3+5+1+1+0+1","leaf":true}]},{"id":112,"o":92393,"text":" Mobile GerÃ¤te mit installiertem Kaspersky Endpoint Security fÃ¼r Android verwalten ","url":"92393_1.htm","node":"3+5+1+1+1","leaf":true}]},{"id":113,"o":28253,"text":" Informationen zur LeistungsfÃ¤higkeit des Administrationsservers ","url":"28253.htm","node":"3+5+1+2","children":[{"id":114,"o":152283,"text":" EinschrÃ¤nkungen der Verbindung mit dem Administrationsserver ","url":"152283.htm","node":"3+5+1+2+0","leaf":true},{"id":115,"o":152284,"text":" Ergebnisse der Leistungstests des Administrationsservers ","url":"152284.htm","node":"3+5+1+2+1","leaf":true},{"id":116,"o":178552,"text":" Ergebnisse der Leistungstests des KSN-Proxyservers ","url":"178552.htm","node":"3+5+1+2+2","leaf":true}]},{"id":117,"o":255242,"text":" Netzwerkeinstellungen zur Interaktion mit externen Diensten ","url":"255242.htm","node":"3+5+1+3","leaf":true}]},{"id":118,"o":92444,"text":" Softwareverteilung fÃ¼r den Administrationsagenten und die Sicherheitsanwendung ","url":"92444.htm","node":"3+5+2","children":[{"id":119,"o":92445,"text":" Erstmalige Bereitstellung ","url":"92445.htm","node":"3+5+2+0","children":[{"id":120,"o":92446,"text":" Anpassen der Einstellungen der Installer ","url":"92446.htm","node":"3+5+2+0+0","leaf":true},{"id":121,"o":92447,"text":" Installationspakete ","url":"92447.htm","node":"3+5+2+0+1","leaf":true},{"id":122,"o":92448,"text":" Eigenschaften des MSI-Installers und der Transformationsdateien ","url":"92448.htm","node":"3+5+2+0+2","leaf":true},{"id":123,"o":92458,"text":" Bereitstellung mithilfe von Drittanbieter-Tools zur Remote-Installation von Apps ","url":"92458.htm","node":"3+5+2+0+3","leaf":true},{"id":124,"o":92459,"text":" Ãœber Aufgaben zur Remote-Installation in Kaspersky Security Center ","url":"92459.htm","node":"3+5+2+0+4","leaf":true},{"id":125,"o":92460,"text":" Bereitstellung durch Erstellung und Verteilung eines GerÃ¤te-Images ","url":"92460.htm","node":"3+5+2+0+5","leaf":true},{"id":126,"o":92573,"text":" Fehlerhaftes Kopieren eines Festplatten-Images ","url":"92573.htm","node":"3+5+2+0+6","leaf":true},{"id":127,"o":92461,"text":" Bereitstellung mithilfe des Mechanismus der Gruppenrichtlinien von Microsoft Windows ","url":"92461.htm","node":"3+5+2+0+7","leaf":true},{"id":128,"o":92462,"text":" Erzwungene Bereitstellung mithilfe der Aufgabe zur Remote-Installation der Apps von Kaspersky Security Center ","url":"92462.htm","node":"3+5+2+0+8","leaf":true},{"id":129,"o":92463,"text":" Start der von Kaspersky Security Center gebildeten autonomen Pakete ","url":"92463.htm","node":"3+5+2+0+9","leaf":true},{"id":130,"o":92464,"text":" Funktion zur manuellen Installation von Apps ","url":"92464.htm","node":"3+5+2+0+10","leaf":true},{"id":131,"o":273674,"text":" Eine MST-Datei erstellen ","url":"273674.htm","node":"3+5+2+0+11","leaf":true}]},{"id":132,"o":92465,"text":" Remote-Installation von Apps auf GerÃ¤te mit installiertem Administrationsagenten ","url":"92465.htm","node":"3+5+2+1","leaf":true},{"id":133,"o":92466,"text":" Verwaltung des Neustarts von GerÃ¤ten in der Aufgabe zur Remote-Installation ","url":"92466.htm","node":"3+5+2+2","leaf":true},{"id":134,"o":92467,"text":" Zweckdienlichkeit des Datenbanken-Updates im Installationspaket der Sicherheitsanwendung ","url":"92467.htm","node":"3+5+2+3","leaf":true},{"id":135,"o":92470,"text":" Verwendung von Tools zur Remote-Installation der Apps von Kaspersky Security Center fÃ¼r den Start von beliebigen ausfÃ¼hrbaren Dateien auf den verwalteten GerÃ¤ten ","url":"92470.htm","node":"3+5+2+4","leaf":true},{"id":136,"o":92471,"text":" Monitoring der Bereitstellung ","url":"92471.htm","node":"3+5+2+5","leaf":true},{"id":137,"o":92472,"text":" Anpassen der Einstellungen der Installer ","url":"92472.htm","node":"3+5+2+6","children":[{"id":138,"o":92473,"text":" Allgemeine Informationen ","url":"92473.htm","node":"3+5+2+6+0","leaf":true},{"id":139,"o":92474,"text":" Installation im Silent-Modus (mit Antwortdatei) ","url":"92474.htm","node":"3+5+2+6+1","leaf":true},{"id":140,"o":92475,"text":" Installation des Administrationsagenten im Silent-Modus (ohne Antwortdatei) ","url":"92475.htm","node":"3+5+2+6+2","leaf":true},{"id":141,"o":92476,"text":" Teilweises Anpassen der Installationseinstellungen durch setup.exe ","url":"92476.htm","node":"3+5+2+6+3","leaf":true},{"id":142,"o":92477,"text":" Installationseinstellungen fÃ¼r den Administrationsserver ","url":"92477.htm","node":"3+5+2+6+4","leaf":true},{"id":143,"o":92478,"text":" Installationseinstellungen fÃ¼r den Administrationsagenten ","url":"92478.htm","node":"3+5+2+6+5","leaf":true}]},{"id":144,"o":92479,"text":" Virtuelle Infrastruktur ","url":"92479.htm","node":"3+5+2+7","children":[{"id":145,"o":92480,"text":" Empfehlungen zur Senkung der Belastung auf den virtuellen Maschinen ","url":"92480.htm","node":"3+5+2+7+0","leaf":true},{"id":146,"o":92481,"text":" UnterstÃ¼tzung von dynamischen virtuellen Maschinen ","url":"92481.htm","node":"3+5+2+7+1","leaf":true},{"id":147,"o":92482,"text":" UnterstÃ¼tzung des Kopierens von virtuellen Maschinen ","url":"92482.htm","node":"3+5+2+7+2","leaf":true}]},{"id":148,"o":92483,"text":" UnterstÃ¼tzung des Rollbacks des Dateisystems fÃ¼r GerÃ¤te mit Administrationsagent ","url":"92483.htm","node":"3+5+2+8","leaf":true},{"id":149,"o":6391,"text":" Lokale Installation von Programmen ","url":"6391.htm","node":"3+5+2+9","children":[{"id":150,"o":6392,"text":" Lokale Installation des Administrationsagenten ","url":"6392.htm","node":"3+5+2+9+0","leaf":true},{"id":151,"o":73101,"text":" Installation des Administrationsagenten im Silent-Modus ","url":"73101.htm","node":"3+5+2+9+1","leaf":true},{"id":152,"o":199693,"text":" Administrationsagent fÃ¼r Linux im Silent-Modus installieren (mit einer Antwort-Datei) ","url":"199693.htm","node":"3+5+2+9+2","leaf":true},{"id":153,"o":251798,"text":" Ein GerÃ¤t auf dem AstraÂ&nbsp;Linux im Modus der abgeschlossenen Softwareumgebung ausgefÃ¼hrt wird fÃ¼r die Installation des Administrationsagenten vorbereiten ","url":"251798.htm","node":"3+5+2+9+3","leaf":true},{"id":154,"o":279662,"text":" Administrationsagent fÃ¼r Linux im interaktiven Modus installieren ","url":"279662.htm","node":"3+5+2+9+4","leaf":true},{"id":155,"o":6393,"text":" Lokale Installation des Plug-ins fÃ¼r die Programmverwaltung ","url":"6393.htm","node":"3+5+2+9+5","leaf":true},{"id":156,"o":6394,"text":" Programme im Silent-Modus installieren ","url":"6394.htm","node":"3+5+2+9+6","leaf":true},{"id":157,"o":13020,"text":" Programme mithilfe autonomer Installationspakete installieren ","url":"13020.htm","node":"3+5+2+9+7","leaf":true},{"id":158,"o":154925,"text":" Einstellungen des Installationspakets des Administrationsagenten ","url":"154925.htm","node":"3+5+2+9+8","leaf":true},{"id":159,"o":204023,"text":" Anzeigen der Datenschutzrichtlinie ","url":"204023.htm","node":"3+5+2+9+9","leaf":true}]}]},{"id":160,"o":64428,"text":" Bereitstellung der Systeme zur Verwaltung mobiler GerÃ¤te ","url":"64428.htm","node":"3+5+3","children":[{"id":161,"o":64664,"text":" Bereitstellung des Verwaltungssystems mithilfe des iOSÂ&nbsp;MDM-Protokolls ","url":"64664.htm","node":"3+5+3+0","children":[{"id":162,"o":64668,"text":" Installation des iOS MDM-Servers ","url":"64668.htm","node":"3+5+3+0+0","leaf":true},{"id":163,"o":110107,"text":" iOSÂ&nbsp;MDM-Server im Silent-Modus installieren ","url":"110107.htm","node":"3+5+3+0+1","leaf":true},{"id":164,"o":92514,"text":" Schemata der Bereitstellung eines iOS MDM-Servers ","url":"92514.htm","node":"3+5+3+0+2","leaf":true},{"id":165,"o":92515,"text":" Vereinfachtes Schema der Bereitstellung ","url":"92515.htm","node":"3+5+3+0+3","leaf":true},{"id":166,"o":92516,"text":" Schema der Bereitstellung unter Verwendung der erzwungenen Delegierung Kerberos (KCD) ","url":"92516.htm","node":"3+5+3+0+4","leaf":true},{"id":167,"o":64900,"text":" APNs-Zertifikat anfordern ","url":"64900.htm","node":"3+5+3+0+5","leaf":true},{"id":168,"o":159855,"text":" Update des APNs-Zertifikats ","url":"159855.htm","node":"3+5+3+0+6","leaf":true},{"id":169,"o":210607,"text":" Das Reservezertifikat des iOS MDM-Servers konfigurieren ","url":"210607.htm","node":"3+5+3+0+7","leaf":true},{"id":170,"o":64666,"text":" APNs-Zertifikat auf dem iOSÂ&nbsp;MDM-Server installieren ","url":"64666.htm","node":"3+5+3+0+8","leaf":true},{"id":171,"o":92518,"text":" Einstellungen fÃ¼r den Zugriff auf den Dienst Apple Push Notification ","url":"92518.htm","node":"3+5+3+0+9","leaf":true},{"id":172,"o":89539,"text":" Allgemeines Zertifikat ausstellen und auf dem mobilen GerÃ¤t installieren ","url":"89539.htm","node":"3+5+3+0+10","leaf":true}]},{"id":173,"o":114929,"text":" KES-GerÃ¤t zur Liste der verwalteten GerÃ¤te hinzufÃ¼gen ","url":"114929.htm","node":"3+5+3+1","leaf":true},{"id":174,"o":92520,"text":" Verbindung von KES-GerÃ¤ten mit dem Administrationsserver ","url":"92520.htm","node":"3+5+3+2","children":[{"id":175,"o":92521,"text":" Direkte Verbindung der GerÃ¤te mit dem Administrationsserver ","url":"92521.htm","node":"3+5+3+2+0","leaf":true},{"id":176,"o":92523,"text":" Anschlussschema fÃ¼r KES-GerÃ¤te mit dem Server unter Verwendung der erzwungenen Delegierung Kerberos (KCD) ","url":"92523.htm","node":"3+5+3+2+1","leaf":true},{"id":177,"o":92525,"text":" Verwendung von FirebaseÂ&nbsp;CloudÂ&nbsp;Messaging ","url":"92525.htm","node":"3+5+3+2+2","leaf":true}]},{"id":178,"o":92526,"text":" Integration in die Public-Key-Infrastruktur ","url":"92526.htm","node":"3+5+3+3","leaf":true},{"id":179,"o":92527,"text":" Kaspersky Security Center Webserver ","url":"92527.htm","node":"3+5+3+4","leaf":true}]}]},{"id":180,"o":13057,"text":" Kaspersky Security Center installieren ","url":"13057.htm","node":"3+6","children":[{"id":181,"o":6267,"text":" Vorbereitung der Installation ","url":"6267.htm","node":"3+6+0","leaf":true},{"id":182,"o":156275,"text":" Benutzerkonten fÃ¼r die Arbeit mit DBMS ","url":"156275.htm","node":"3+6+1","children":[{"id":183,"o":240593,"text":" Benutzerkonten fÃ¼r die Arbeit mit SQL Server konfigurieren (Windows-Authentifizierung) ","url":"240593.htm","node":"3+6+1+0","leaf":true},{"id":184,"o":240594,"text":" Benutzerkonten fÃ¼r die Arbeit mit SQL Server konfigurieren (SQL Server-Authentifizierung) ","url":"240594.htm","node":"3+6+1+1","leaf":true},{"id":185,"o":240816,"text":" Benutzerkonten fÃ¼r die Arbeit mit MySQL und MariaDB konfigurieren ","url":"240816.htm","node":"3+6+1+2","leaf":true},{"id":186,"o":242538,"text":" Benutzerkonten fÃ¼r die Arbeit mit PostgreSQL und PostgresÂ&nbsp;Pro konfigurieren ","url":"242538.htm","node":"3+6+1+3","leaf":true}]},{"id":187,"o":198526,"text":" Szenario: Authentifizierung von Microsoft SQL Server ","url":"198526.htm","node":"3+6+2","leaf":true},{"id":188,"o":261227,"text":" Szenario: Authentifizierung am MySQL-Server ","url":"261227.htm","node":"3+6+3","leaf":true},{"id":189,"o":257050,"text":" Szenario: Authentifizierung am PostgreSQL-Server ","url":"257050.htm","node":"3+6+4","leaf":true},{"id":190,"o":92398,"text":" Installationsempfehlungen fÃ¼r den Administrationsserver ","url":"92398.htm","node":"3+6+5","children":[{"id":191,"o":92400,"text":" Benutzerkonten fÃ¼r die Dienste des Administrationsservers auf dem Failover-Cluster erstellen ","url":"92400.htm","node":"3+6+5+0","leaf":true},{"id":192,"o":92408,"text":" Den freigegebenen Ordner angeben ","url":"92408.htm","node":"3+6+5+1","leaf":true},{"id":193,"o":92409,"text":" Remote-Installation Ã¼ber den Administrationsserver mithilfe von Gruppenrichtlinien des Active Directory ","url":"92409.htm","node":"3+6+5+2","leaf":true},{"id":194,"o":92410,"text":" Remote-Installation Ã¼ber den Versand des UNC-Pfads an das autonome Paket ","url":"92410.htm","node":"3+6+5+3","leaf":true},{"id":195,"o":92412,"text":" Update aus dem freigegebenen Ordner des Administrationsservers ","url":"92412.htm","node":"3+6+5+4","leaf":true},{"id":196,"o":92413,"text":" Betriebssystem-Images installieren ","url":"92413.htm","node":"3+6+5+5","leaf":true},{"id":197,"o":92414,"text":" Adresse des Administrationsservers angeben ","url":"92414.htm","node":"3+6+5+6","leaf":true}]},{"id":198,"o":13054,"text":" Standardinstallation ","url":"13054.htm","node":"3+6+6","children":[{"id":199,"o":67868,"text":" Schritt 1. Anzeigen des Lizenzvertrags und der Datenschutzrichtlinie ","url":"67868.htm","node":"3+6+6+0","leaf":true},{"id":200,"o":154916,"text":" Schritt 2. Installationsart auswÃ¤hlen ","url":"154916.htm","node":"3+6+6+1","leaf":true},{"id":201,"o":204961,"text":" Schritt 3. Kaspersky Security Center Web Console installieren ","url":"204961.htm","node":"3+6+6+2","leaf":true},{"id":202,"o":154918,"text":" Schritt 4. AuswÃ¤hlen der NetzwerkgrÃ¶ÃŸe ","url":"154918.htm","node":"3+6+6+3","leaf":true},{"id":203,"o":154920,"text":" Schritt 5. AuswÃ¤hlen der Datenbank ","url":"154920.htm","node":"3+6+6+4","leaf":true},{"id":204,"o":154922,"text":" Schritt 6. Konfigurieren des SQL-Servers ","url":"154922.htm","node":"3+6+6+5","leaf":true},{"id":205,"o":154924,"text":" Schritt 7. AuswÃ¤hlen eines Authentifizierungsmodus ","url":"154924.htm","node":"3+6+6+6","leaf":true},{"id":206,"o":154928,"text":" Schritt 8. Entpacken und Installieren der Dateien auf der Festplatte ","url":"154928.htm","node":"3+6+6+7","leaf":true}]},{"id":207,"o":13055,"text":" Benutzerdefinierte Installation ","url":"13055.htm","node":"3+6+7","children":[{"id":208,"o":67868,"text":" Schritt 1. Anzeigen des Lizenzvertrags und der Datenschutzrichtlinie ","url":"67868_1.htm","node":"3+6+7+0","leaf":true},{"id":209,"o":35691,"text":" Schritt 2. Installationsart auswÃ¤hlen ","url":"35691.htm","node":"3+6+7+1","leaf":true},{"id":210,"o":13082,"text":" Schritt 3. AuswÃ¤hlen der zu installierenden Komponenten ","url":"13082.htm","node":"3+6+7+2","leaf":true},{"id":211,"o":176764,"text":" Schritt 4. Kaspersky Security Center Web Console installieren ","url":"176764.htm","node":"3+6+7+3","leaf":true},{"id":212,"o":13083,"text":" Schritt 5. AuswÃ¤hlen der NetzwerkgrÃ¶ÃŸe ","url":"13083.htm","node":"3+6+7+4","leaf":true},{"id":213,"o":13085,"text":" Schritt 6. AuswÃ¤hlen der Datenbank ","url":"13085.htm","node":"3+6+7+5","leaf":true},{"id":214,"o":13086,"text":" Schritt 7. Konfigurieren des SQL-Servers ","url":"13086.htm","node":"3+6+7+6","leaf":true},{"id":215,"o":13087,"text":" Schritt 8. AuswÃ¤hlen eines Authentifizierungsmodus ","url":"13087.htm","node":"3+6+7+7","leaf":true},{"id":216,"o":13084,"text":" Schritt 9. AuswÃ¤hlen des Benutzerkontos fÃ¼r den Start des Administrationsservers ","url":"13084.htm","node":"3+6+7+8","leaf":true},{"id":217,"o":91590,"text":" Schritt 10. AuswÃ¤hlen des Benutzerkontos fÃ¼r das AusfÃ¼hren der Dienste von Kaspersky Security Center ","url":"91590.htm","node":"3+6+7+9","leaf":true},{"id":218,"o":13088,"text":" Schritt 11. Festlegen eines gemeinsamen Ordners ","url":"13088.htm","node":"3+6+7+10","leaf":true},{"id":219,"o":13089,"text":" Schritt 12. Konfigurieren der Verbindung zum Administrationsserver ","url":"13089.htm","node":"3+6+7+11","leaf":true},{"id":220,"o":13090,"text":" Schritt 13. Festlegen der Adresse des Administrationsservers ","url":"13090.htm","node":"3+6+7+12","leaf":true},{"id":221,"o":94265,"text":" Schritt 14. Adresse des Administrationsservers fÃ¼r die Verbindung mit mobilen GerÃ¤ten ","url":"94265.htm","node":"3+6+7+13","leaf":true},{"id":222,"o":54967,"text":" Schritt 15. Plug-ins fÃ¼r die Programmverwaltung wÃ¤hlen ","url":"54967.htm","node":"3+6+7+14","leaf":true},{"id":223,"o":13092,"text":" Schritt 16. Entpacken und Installieren der Dateien auf der Festplatte ","url":"13092.htm","node":"3+6+7+15","leaf":true}]},{"id":224,"o":222395,"text":" KasperskyÂ&nbsp;Security Center Failover-Cluster bereitstellen ","url":"222395.htm","node":"3+6+8","children":[{"id":225,"o":222333,"text":" Szenario: Ein KasperskyÂ&nbsp;Security Center Failover-Cluster bereitstellen ","url":"222333.htm","node":"3+6+8+0","leaf":true},{"id":226,"o":222358,"text":" Ãœber das KasperskyÂ&nbsp;SecurityÂ&nbsp;Center Failover-Cluster ","url":"222358.htm","node":"3+6+8+1","leaf":true},{"id":227,"o":222364,"text":" Einen Dateiserver fÃ¼r ein KasperskyÂ&nbsp;Security Center Failover-Cluster vorbereiten ","url":"222364.htm","node":"3+6+8+2","leaf":true},{"id":228,"o":222375,"text":" Knoten fÃ¼r ein KasperskyÂ&nbsp;Security Center Failover-Cluster vorbereiten ","url":"222375.htm","node":"3+6+8+3","leaf":true},{"id":229,"o":222473,"text":" Kaspersky Security Center auf den Knoten des Kaspersky Security Center Failover-Clusters installieren ","url":"222473.htm","node":"3+6+8+4","leaf":true},{"id":230,"o":222447,"text":" Cluster-Knoten manuell starten und beenden ","url":"222447.htm","node":"3+6+8+5","leaf":true}]},{"id":231,"o":204942,"text":" Installation des Administrationsservers in einem WindowsÂ&nbsp;Server Failover-Cluster ","url":"204942.htm","node":"3+6+9","children":[{"id":232,"o":67868,"text":" Schritt 1. Anzeigen des Lizenzvertrags und der Datenschutzrichtlinie ","url":"67868_2.htm","node":"3+6+9+0","leaf":true},{"id":233,"o":205038,"text":" Schritt 2. AuswÃ¤hlen des Installationstyps in dem Cluster ","url":"205038.htm","node":"3+6+9+1","leaf":true},{"id":234,"o":205041,"text":" Schritt 3. Angeben des Namens des virtuellen Administrationsservers ","url":"205041.htm","node":"3+6+9+2","leaf":true},{"id":235,"o":205044,"text":" Schritt 4. Angeben der Netzwerkdetails des virtuellen Administrationsservers ","url":"205044.htm","node":"3+6+9+3","leaf":true},{"id":236,"o":205049,"text":" Schritt 5. Angeben einer Clustergruppe ","url":"205049.htm","node":"3+6+9+4","leaf":true},{"id":237,"o":205064,"text":" Schritt 6. AuswÃ¤hlen eines Cluster-Datenspeichers ","url":"205064.htm","node":"3+6+9+5","leaf":true},{"id":238,"o":205065,"text":" Schritt 7. Angeben eines Kontos fÃ¼r die Remote-Installation ","url":"205065.htm","node":"3+6+9+6","leaf":true},{"id":239,"o":205067,"text":" Schritt 8. AuswÃ¤hlen der zu installierenden Komponenten ","url":"205067.htm","node":"3+6+9+7","leaf":true},{"id":240,"o":205068,"text":" Schritt 9. AuswÃ¤hlen der NetzwerkgrÃ¶ÃŸe ","url":"205068.htm","node":"3+6+9+8","leaf":true},{"id":241,"o":205069,"text":" Schritt 10. AuswÃ¤hlen der Datenbank ","url":"205069.htm","node":"3+6+9+9","leaf":true},{"id":242,"o":205070,"text":" Schritt 11. Konfigurieren des SQL-Servers ","url":"205070.htm","node":"3+6+9+10","leaf":true},{"id":243,"o":205071,"text":" Schritt 12. AuswÃ¤hlen eines Authentifizierungsmodus ","url":"205071.htm","node":"3+6+9+11","leaf":true},{"id":244,"o":205073,"text":" Schritt 13. AuswÃ¤hlen des Benutzerkontos fÃ¼r den Start des Administrationsservers ","url":"205073.htm","node":"3+6+9+12","leaf":true},{"id":245,"o":205074,"text":" Schritt 14. AuswÃ¤hlen des Benutzerkontos fÃ¼r das AusfÃ¼hren der Dienste von Kaspersky Security Center ","url":"205074.htm","node":"3+6+9+13","leaf":true},{"id":246,"o":205077,"text":" Schritt 15. Festlegen eines gemeinsamen Ordners ","url":"205077.htm","node":"3+6+9+14","leaf":true},{"id":247,"o":205079,"text":" Schritt 16. Konfigurieren der Verbindung zum Administrationsserver ","url":"205079.htm","node":"3+6+9+15","leaf":true},{"id":248,"o":205081,"text":" Schritt 17. Festlegen der Adresse des Administrationsservers ","url":"205081.htm","node":"3+6+9+16","leaf":true},{"id":249,"o":205083,"text":" Schritt 18. Adresse des Administrationsservers fÃ¼r die Verbindung mit mobilen GerÃ¤ten ","url":"205083.htm","node":"3+6+9+17","leaf":true},{"id":250,"o":205153,"text":" Schritt 19. Entpacken und Installieren der Dateien auf der Festplatte ","url":"205153.htm","node":"3+6+9+18","leaf":true}]},{"id":251,"o":73098,"text":" Installation des Administrationsservers im Silent-Modus ","url":"73098.htm","node":"3+6+10","leaf":true},{"id":252,"o":56214,"text":" Verwaltungskonsole auf dem Administrator-Arbeitsplatz installieren ","url":"56214.htm","node":"3+6+11","leaf":true},{"id":253,"o":25950,"text":" Ã„nderungen im System nach der Installation von Kaspersky Security Center ","url":"25950.htm","node":"3+6+12","leaf":true},{"id":254,"o":6372,"text":" Programmdeinstallation ","url":"6372.htm","node":"3+6+13","leaf":true}]},{"id":255,"o":235425,"text":" Ãœber das Upgrade von Kaspersky Security Center ","url":"235425.htm","node":"3+7","children":[{"id":256,"o":6373,"text":" Update der vorherigen Version von KasperskyÂ&nbsp;SecurityÂ&nbsp;Center ","url":"6373.htm","node":"3+7+0","leaf":true},{"id":257,"o":235429,"text":" KasperskyÂ&nbsp;SecurityÂ&nbsp;Center auf den Knoten des KasperskyÂ&nbsp;SecurityÂ&nbsp;Center Failover-Clusters aktualisieren ","url":"235429.htm","node":"3+7+1","leaf":true},{"id":258,"o":279317,"text":" Kaspersky Security Center auf den Knoten eines Microsoft-Failover-Clusters aktualisieren ","url":"279317.htm","node":"3+7+2","leaf":true}]},{"id":259,"o":171271,"text":" Erstkonfiguration von Kaspersky Security Center ","url":"171271.htm","node":"3+8","children":[{"id":260,"o":236687,"text":" HÃ¤rtungsleitfaden ","url":"236687.htm","node":"3+8+0","leaf":true},{"id":261,"o":3177,"text":" Der Schnellstartassistent fÃ¼r den Administrationsserver ","url":"3177.htm","node":"3+8+1","children":[{"id":262,"o":191740,"text":" Ãœber den Schnellstartassistenten ","url":"191740.htm","node":"3+8+1+0","leaf":true},{"id":263,"o":179835,"text":" Start des Schnellstartassistenten fÃ¼r den Administrationsserver ","url":"179835.htm","node":"3+8+1+1","leaf":true},{"id":264,"o":148954,"text":" Schritt 1. Konfigurieren eines Proxyservers ","url":"148954.htm","node":"3+8+1+2","leaf":true},{"id":265,"o":148947,"text":" Schritt 2. AuswÃ¤hlen der Methode zur Programmaktivierung ","url":"148947.htm","node":"3+8+1+3","leaf":true},{"id":266,"o":191748,"text":" Schritt 3. AuswÃ¤hlen der Schutzbereiche und Betriebssysteme ","url":"191748.htm","node":"3+8+1+4","leaf":true},{"id":267,"o":191767,"text":" Schritt 4. AuswÃ¤hlen der  Plug-ins fÃ¼r verwaltete Programme ","url":"191767.htm","node":"3+8+1+5","leaf":true},{"id":268,"o":191791,"text":" Schritt 5. Herunterladen der Programmpakete Erstellen der Installationspakete ","url":"191791.htm","node":"3+8+1+6","leaf":true},{"id":269,"o":148962,"text":" Schritt 6. Konfigurieren von Kaspersky Security Network ","url":"148962.htm","node":"3+8+1+7","leaf":true},{"id":270,"o":148965,"text":" Schritt 7. Konfigurieren von E-Mail-Benachrichtigungen ","url":"148965.htm","node":"3+8+1+8","leaf":true},{"id":271,"o":148999,"text":" Schritt 8. Konfigurieren der Update-Verwaltung ","url":"148999.htm","node":"3+8+1+9","leaf":true},{"id":272,"o":149000,"text":" Schritt 9. Konfigurieren des ersten Schutzes ","url":"149000.htm","node":"3+8+1+10","leaf":true},{"id":273,"o":149001,"text":" Schritt 10. Verbinden mobiler GerÃ¤te ","url":"149001.htm","node":"3+8+1+11","leaf":true},{"id":274,"o":191851,"text":" Schritt 11. Herunterladen von Updates ","url":"191851.htm","node":"3+8+1+12","leaf":true},{"id":275,"o":149002,"text":" Schritt 12. Suchen von GerÃ¤ten ","url":"149002.htm","node":"3+8+1+13","leaf":true},{"id":276,"o":149003,"text":" Schritt 13. AbschlieÃŸen des Schnellstartassistenten ","url":"149003.htm","node":"3+8+1+14","leaf":true}]},{"id":277,"o":123332,"text":" Verbindung der Verwaltungskonsole mit dem Administrationsserver anpassen ","url":"123332.htm","node":"3+8+2","leaf":true},{"id":278,"o":246921,"text":" Die Internetzugriffseinstellungen fÃ¼r den Administrationsserver konfigurieren ","url":"246921.htm","node":"3+8+3","leaf":true},{"id":279,"o":204432,"text":" Verbinden mobiler GerÃ¤te ","url":"204432.htm","node":"3+8+4","children":[{"id":280,"o":204219,"text":" Szenario: Verbinden von mobilen GerÃ¤ten mittels Verbindungs-Gateway ","url":"204219.htm","node":"3+8+4+0","leaf":true},{"id":281,"o":240598,"text":" Szenario: Verbinden von mobilen GerÃ¤ten mittels einem sekundÃ¤ren Administrationsserver in der DMZ ","url":"240598.htm","node":"3+8+4+1","leaf":true},{"id":282,"o":204435,"text":" Ãœber das Verbinden mobiler GerÃ¤te ","url":"204435.htm","node":"3+8+4+2","leaf":true},{"id":283,"o":204255,"text":" Verbinden von externen Desktop-Computern mit dem Administrationsserver ","url":"204255.htm","node":"3+8+4+3","leaf":true},{"id":284,"o":92485,"text":" Ãœber Verbindungsprofile fÃ¼r mobile Benutzer ","url":"92485.htm","node":"3+8+4+4","leaf":true},{"id":285,"o":10806,"text":" Erstellen eines Verbindungsprofils fÃ¼r mobile Benutzer ","url":"10806.htm","node":"3+8+4+5","leaf":true},{"id":286,"o":10419,"text":" Ãœber das Umschalten eines Administrationsagenten auf einen anderen Administrationsserver ","url":"10419.htm","node":"3+8+4+6","leaf":true},{"id":287,"o":10807,"text":" Erstellen der Regel fÃ¼r die Umstellung des Administrationsagenten gemÃ¤ÃŸ dem Netzwerkspeicherort ","url":"10807.htm","node":"3+8+4+7","leaf":true},{"id":288,"o":153722,"text":" Ereignisbenachrichtigungen ","url":"153722.htm","node":"3+8+4+8","children":[{"id":289,"o":4944,"text":" Benachrichtigungseinstellungen fÃ¼r Ereignisse anpassen ","url":"4944.htm","node":"3+8+4+8+0","leaf":true},{"id":290,"o":4834,"text":" Verteilung von Benachrichtigungen prÃ¼fen ","url":"4834.htm","node":"3+8+4+8+1","leaf":true},{"id":291,"o":84509,"text":" Benachrichtigung Ã¼ber Ereignisse mithilfe einer ausfÃ¼hrbaren Datei ","url":"84509.htm","node":"3+8+4+8+2","leaf":true}]}]},{"id":292,"o":174316,"text":" Kommunikation mitÂ&nbsp;TLS verschlÃ¼sseln ","url":"174316.htm","node":"3+8+5","leaf":true},{"id":293,"o":94148,"text":" Schnittstelle konfigurieren ","url":"94148.htm","node":"3+8+6","leaf":true}]},{"id":294,"o":179027,"text":" GerÃ¤te im Netzwerk finden ","url":"179027.htm","node":"3+9","children":[{"id":295,"o":179028,"text":" Szenario: NetzwerkgerÃ¤te finden ","url":"179028.htm","node":"3+9+0","leaf":true},{"id":296,"o":3871,"text":" Nicht zugeordnete GerÃ¤te ","url":"3871.htm","node":"3+9+1","children":[{"id":297,"o":3884,"text":" Suchen von GerÃ¤ten ","url":"3884.htm","node":"3+9+1+0","children":[{"id":298,"o":3885,"text":" Windows-Netzwerkabfrage ","url":"3885.htm","node":"3+9+1+0+0","leaf":true},{"id":299,"o":3886,"text":" Abfrage der ActiveÂ&nbsp;Directory ","url":"3886.htm","node":"3+9+1+0+1","leaf":true},{"id":300,"o":3887,"text":" IP-Bereiche abfragen ","url":"3887.htm","node":"3+9+1+0+2","leaf":true},{"id":301,"o":222066,"text":" Zeroconf-Abfrage ","url":"222066.htm","node":"3+9+1+0+3","leaf":true}]},{"id":302,"o":3888,"text":" Arbeit mit Windows-DomÃ¤nen. DomÃ¤neneinstellungen anzeigen und Ã¤ndern ","url":"3888.htm","node":"3+9+1+1","leaf":true},{"id":303,"o":176626,"text":" Aufbewahrungsregeln fÃ¼r nicht zugeordnete GerÃ¤te anpassen ","url":"176626.htm","node":"3+9+1+2","leaf":true},{"id":304,"o":52158,"text":" Arbeiten mit IP-Bereichen ","url":"52158.htm","node":"3+9+1+3","children":[{"id":305,"o":3889,"text":" IP-Bereich erstellen ","url":"3889.htm","node":"3+9+1+3+0","leaf":true},{"id":306,"o":3890,"text":" Einstellungen eines IP-Bereichs anzeigen und Ã¤ndern ","url":"3890.htm","node":"3+9+1+3+1","leaf":true}]},{"id":307,"o":3891,"text":" ActiveÂ&nbsp;Directory Gruppen. Gruppeneinstellungen anzeigen und Ã¤ndern ","url":"3891.htm","node":"3+9+1+4","leaf":true},{"id":308,"o":5072,"text":" Regeln fÃ¼r das automatische Verschieben von GerÃ¤ten in Administrationsgruppen erstellen ","url":"5072.htm","node":"3+9+1+5","leaf":true},{"id":309,"o":67243,"text":" Dynamischen VDI-Modus auf Client-GerÃ¤ten verwenden ","url":"67243.htm","node":"3+9+1+6","children":[{"id":310,"o":67247,"text":" Dynamischen VDI-Modus in den Eigenschaften des Installationspakets des Administrationsagenten aktivieren ","url":"67247.htm","node":"3+9+1+6+0","leaf":true},{"id":311,"o":67248,"text":" GerÃ¤te suchen, die zu VDI gehÃ¶ren ","url":"67248.htm","node":"3+9+1+6+1","leaf":true},{"id":312,"o":67249,"text":" GerÃ¤te, die zu VDI gehÃ¶ren, in eine Administrationsgruppe verschieben ","url":"67249.htm","node":"3+9+1+6+2","leaf":true}]}]},{"id":313,"o":63679,"text":" ArbeitsgerÃ¤tebestand ","url":"63679.htm","node":"3+9+2","children":[{"id":314,"o":63680,"text":" Informationen Ã¼ber neue GerÃ¤te hinzufÃ¼gen ","url":"63680.htm","node":"3+9+2+0","leaf":true},{"id":315,"o":63681,"text":" Kriterien zur Erkennung von UnternehmensgerÃ¤ten anpassen ","url":"63681.htm","node":"3+9+2+1","leaf":true},{"id":316,"o":159862,"text":" Benutzerdefinierte Felder anpassen ","url":"159862.htm","node":"3+9+2+2","leaf":true}]}]},{"id":317,"o":173420,"text":" Lizenzierung ","url":"173420.htm","node":"3+10","children":[{"id":318,"o":138255,"text":" Ereignisse bei Ãœberschreitung der LizenzbeschrÃ¤nkung ","url":"138255.htm","node":"3+10+0","leaf":true},{"id":319,"o":213977,"text":" Ãœber die Lizenzierung ","url":"213977.htm","node":"3+10+1","children":[{"id":320,"o":111629,"text":" Ãœber die Lizenz ","url":"69240.htm","node":"3+10+1+0","leaf":true},{"id":321,"o":179583,"text":" Ãœber den Endbenutzer-Lizenzvertrag ","url":"179583.htm","node":"3+10+1+1","leaf":true},{"id":322,"o":111631,"text":" Ãœber das Lizenzzertifikat ","url":"73976.htm","node":"3+10+1+2","leaf":true},{"id":323,"o":111636,"text":" Ãœber den LizenzschlÃ¼ssel ","url":"69295.htm","node":"3+10+1+3","leaf":true},{"id":324,"o":275831,"text":" Ãœber die SchlÃ¼sseldatei ","url":"69431.htm","node":"3+10+1+4","leaf":true},{"id":325,"o":91039,"text":" Ãœber das Abonnement ","url":"91039.htm","node":"3+10+1+5","leaf":true},{"id":326,"o":111091,"text":" Ãœber den Aktivierungscode ","url":"111091.htm","node":"3+10+1+6","leaf":true},{"id":327,"o":192967,"text":" Vereinbarung mit einem Endbenutzer-Lizenzvertrag widerrufen ","url":"192967.htm","node":"3+10+1+7","leaf":true}]},{"id":328,"o":175956,"text":" Ãœber die Bereitstellung von Daten ","url":"175956.htm","node":"3+10+2","leaf":true},{"id":329,"o":65277,"text":" Varianten der Lizenzierung von Kaspersky Security Center ","url":"65277.htm","node":"3+10+3","leaf":true},{"id":330,"o":173097,"text":" Besonderheiten der Lizenzverwaltung fÃ¼r Kaspersky Security Center und die verwalteten Programme ","url":"173097.htm","node":"3+10+4","leaf":true}]},{"id":331,"o":6374,"text":" Kaspersky-Anwendungen. Zentralisierte Bereitstellung ","url":"6374.htm","node":"3+11","children":[{"id":332,"o":180093,"text":" Sicherheitsanwendungen von Drittanbietern ersetzen ","url":"180093.htm","node":"3+11+0","leaf":true},{"id":333,"o":6385,"text":" Anwendungen mit der Aufgabe zur Remote-Installation installieren ","url":"6385.htm","node":"3+11+1","children":[{"id":334,"o":54971,"text":" Programm auf ausgewÃ¤hlten GerÃ¤ten installieren ","url":"54971.htm","node":"3+11+1+0","leaf":true},{"id":335,"o":54970,"text":" Programm auf den Client-GerÃ¤ten einer Administrationsgruppe installieren ","url":"54970.htm","node":"3+11+1+1","leaf":true},{"id":336,"o":54994,"text":" Programme mit Gruppenrichtlinien des ActiveÂ&nbsp;Directory installieren ","url":"54994.htm","node":"3+11+1+2","leaf":true},{"id":337,"o":6388,"text":" Anwendungen auf sekundÃ¤ren Administrationsservern installieren ","url":"6388.htm","node":"3+11+1+3","leaf":true}]},{"id":338,"o":6390,"text":" Programme mit dem Assistenten fÃ¼r Remote-Installationen installieren ","url":"6390.htm","node":"3+11+2","leaf":true},{"id":339,"o":269226,"text":" Umgang mit Verwaltungs-Plug-ins ","url":"269226.htm","node":"3+11+3","leaf":true},{"id":340,"o":13065,"text":" Bericht Ã¼ber die Bereitstellung des Schutzes anzeigen ","url":"13065.htm","node":"3+11+4","leaf":true},{"id":341,"o":6389,"text":" Remote-Deinstallation von Programmen ","url":"6389.htm","node":"3+11+5","children":[{"id":342,"o":54998,"text":" Remote-Deinstallation eines Programms von den Client-GerÃ¤ten einer Administrationsgruppe ","url":"54998.htm","node":"3+11+5+0","leaf":true},{"id":343,"o":54999,"text":" Remote-Deinstallation eines Programms von den gewÃ¤hlten GerÃ¤ten ","url":"54999.htm","node":"3+11+5+1","leaf":true}]},{"id":344,"o":13068,"text":" Verwendung von Installationspaketen ","url":"13068.htm","node":"3+11+6","children":[{"id":345,"o":13141,"text":" Installationspaket erstellen ","url":"13141.htm","node":"3+11+6+0","leaf":true},{"id":346,"o":192396,"text":" Autonome Installationspakete erstellen ","url":"192396.htm","node":"3+11+6+1","leaf":true},{"id":347,"o":192470,"text":" Erstellen benutzerdefinierter Installationspakete ","url":"192470.htm","node":"3+11+6+2","leaf":true},{"id":348,"o":192664,"text":" Eigenschaften von benutzerdefinierten Installationspaketen anzeigen und bearbeiten ","url":"192664.htm","node":"3+11+6+3","leaf":true},{"id":349,"o":227729,"text":" Installationspaket des Administrationsagenten aus dem Programmpaket von Kaspersky Security Center beziehen ","url":"227729.htm","node":"3+11+6+4","leaf":true},{"id":350,"o":6383,"text":" Installationspakete an sekundÃ¤re Administrationsserver verteilen ","url":"6383.htm","node":"3+11+6+5","leaf":true},{"id":351,"o":6384,"text":" Installationspakete mithilfe von Verteilungspunkten verteilen ","url":"6384.htm","node":"3+11+6+6","leaf":true},{"id":352,"o":6378,"text":" Daten Ã¼ber die Ergebnisse der Programminstallation an KasperskyÂ&nbsp;SecurityÂ&nbsp;Center Ã¼bertragen ","url":"6378.htm","node":"3+11+6+7","leaf":true},{"id":353,"o":215458,"text":" Die KSN Proxy Server-Adresse fÃ¼r Installationspakete festlegen ","url":"215458.htm","node":"3+11+6+8","leaf":true}]},{"id":354,"o":55959,"text":" Aktuelle Versionen der Programme downloaden ","url":"55959.htm","node":"3+11+7","leaf":true},{"id":355,"o":12883,"text":" Ein Windows-GerÃ¤t fÃ¼r die Remote-Installation vorbereiten ","url":"12883.htm","node":"3+11+8","leaf":true},{"id":356,"o":137593,"text":" Ein Linux-GerÃ¤t vorbereiten und den Administrationsagenten auf einem Linux-GerÃ¤t remote installieren ","url":"137593.htm","node":"3+11+9","children":[{"id":357,"o":228278,"text":" Ein GerÃ¤t mit SUSE Linux Enterprise Server 15 fÃ¼r die Installation des Administrationsagenten vorbereiten ","url":"228278.htm","node":"3+11+9+0","leaf":true}]},{"id":358,"o":199934,"text":" Ein GerÃ¤t mit dem Betriebssystem macOS fÃ¼r die Remote-Installation des Administrationsagenten vorbereiten ","url":"199934.htm","node":"3+11+10","leaf":true}]},{"id":359,"o":3612,"text":" Kaspersky-Anwendungen: Lizenzierung und Aktivierung ","url":"3612.htm","node":"3+12","children":[{"id":360,"o":180068,"text":" Lizenzierung der verwalteten Programme ","url":"180068_1.htm","node":"3+12+0","leaf":true},{"id":361,"o":3613,"text":" Informationen zu verwendeten LizenzschlÃ¼sseln anzeigen ","url":"3613.htm","node":"3+12+1","leaf":true},{"id":362,"o":3615,"text":" LizenzschlÃ¼ssel zur Datenverwaltung des Administrationsservers hinzufÃ¼gen ","url":"3615.htm","node":"3+12+2","leaf":true},{"id":363,"o":88413,"text":" LizenzschlÃ¼ssel des Administrationsservers lÃ¶schen ","url":"88413.htm","node":"3+12+3","leaf":true},{"id":364,"o":3617,"text":" LizenzschlÃ¼ssel auf Client-GerÃ¤te verteilen ","url":"3617.htm","node":"3+12+4","leaf":true},{"id":365,"o":11511,"text":" LizenzschlÃ¼ssel automatisch verteilen ","url":"11511.htm","node":"3+12+5","leaf":true},{"id":366,"o":3618,"text":" Bericht Ã¼ber die Nutzung von LizenzschlÃ¼sseln erstellen und anzeigen ","url":"3618.htm","node":"3+12+6","leaf":true},{"id":367,"o":222233,"text":" Informationen zu den LizenzschlÃ¼sseln des Programms anzeigen ","url":"222233.htm","node":"3+12+7","leaf":true},{"id":368,"o":275779,"text":" Eine LizenzschlÃ¼sseldatei exportieren ","url":"275779.htm","node":"3+12+8","leaf":true}]},{"id":369,"o":171272,"text":" Netzwerkschutz konfigurieren ","url":"171272.htm","node":"3+13","children":[{"id":370,"o":179344,"text":" Szenario: Netzwerkschutz konfigurieren ","url":"179344.htm","node":"3+13+0","leaf":true},{"id":371,"o":177128,"text":" Richtlinien einrichten und verwalten: gerÃ¤teorientierte Herangehensweise ","url":"177128.htm","node":"3+13+1","leaf":true},{"id":372,"o":166721,"text":" GerÃ¤teorientierte und benutzerorientierte Methode der Sicherheitsverwaltung ","url":"166721.htm","node":"3+13+2","leaf":true},{"id":373,"o":92418,"text":" Richtlinie fÃ¼r Kaspersky Endpoint Security manuell konfigurieren ","url":"92418.htm","node":"3+13+3","children":[{"id":374,"o":175185,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Erweiterter Schutz&amp;quot; ","url":"175185.htm","node":"3+13+3+0","leaf":true},{"id":375,"o":92419,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Basisschutz&amp;quot; ","url":"92419.htm","node":"3+13+3+1","leaf":true},{"id":376,"o":92421,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Allgemeine Einstellungen&amp;quot; ","url":"92421.htm","node":"3+13+3+2","leaf":true},{"id":377,"o":92424,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Konfiguration von Ereignissen&amp;quot; ","url":"92424.htm","node":"3+13+3+3","leaf":true}]},{"id":378,"o":92425,"text":" Gruppenaufgabe zum Aktualisieren von Kaspersky Endpoint Security manuell konfigurieren ","url":"92425.htm","node":"3+13+4","leaf":true},{"id":379,"o":92426,"text":" Manuelle Konfiguration der Gruppenaufgabe zur Untersuchung des GerÃ¤ts durch Kaspersky Endpoint Security ","url":"92426.htm","node":"3+13+5","leaf":true},{"id":380,"o":92427,"text":" Aufgabe &amp;quot;Suche nach Schwachstellen und erforderlichen Updates&amp;quot; planen ","url":"92427.htm","node":"3+13+6","leaf":true},{"id":381,"o":92428,"text":" Manuelle Konfiguration der Gruppenaufgabe zur Installation von Updates und zum SchlieÃŸen von Schwachstellen ","url":"92428.htm","node":"3+13+7","leaf":true},{"id":382,"o":181228,"text":" Maximalen Anzahl an Ereignissen in der Ereignis-Datenverwaltung festlegen ","url":"181228.htm","node":"3+13+8","leaf":true},{"id":383,"o":222383,"text":" Die maximale Speicherdauer fÃ¼r Informationen Ã¼ber behobenen Schwachstellen festlegen ","url":"222383.htm","node":"3+13+9","leaf":true},{"id":384,"o":3772,"text":" Aufgaben verwalten ","url":"3772.htm","node":"3+13+10","children":[{"id":385,"o":3773,"text":" Aufgaben erstellen ","url":"3773.htm","node":"3+13+10+0","leaf":true},{"id":386,"o":3778,"text":" Aufgabe des Administrationsservers erstellen ","url":"3778.htm","node":"3+13+10+1","leaf":true},{"id":387,"o":3779,"text":" Aufgabe fÃ¼r eine Reihe von GerÃ¤ten erstellen ","url":"3779.htm","node":"3+13+10+2","leaf":true},{"id":388,"o":3780,"text":" Lokale Aufgaben erstellen ","url":"3780.htm","node":"3+13+10+3","leaf":true},{"id":389,"o":3783,"text":" Vererbte Gruppenaufgabe im Arbeitsbereich der untergeordneten Gruppe darstellen ","url":"3783.htm","node":"3+13+10+4","leaf":true},{"id":390,"o":3784,"text":" GerÃ¤te vor AusfÃ¼hrung einer Aufgabe automatisch einschalten ","url":"3784.htm","node":"3+13+10+5","leaf":true},{"id":391,"o":3785,"text":" GerÃ¤t nach der AusfÃ¼hrung einer Aufgabe automatisch ausschalten ","url":"3785.htm","node":"3+13+10+6","leaf":true},{"id":392,"o":3786,"text":" Zeitlimit fÃ¼r AufgabenausfÃ¼hrung festlegen ","url":"3786.htm","node":"3+13+10+7","leaf":true},{"id":393,"o":3789,"text":" Aufgaben exportieren ","url":"3789.htm","node":"3+13+10+8","leaf":true},{"id":394,"o":3790,"text":" Aufgaben importieren ","url":"3790.htm","node":"3+13+10+9","leaf":true},{"id":395,"o":17337,"text":" Aufgaben konvertieren ","url":"17337.htm","node":"3+13+10+10","leaf":true},{"id":396,"o":3791,"text":" Aufgaben manuell starten und beenden ","url":"3791.htm","node":"3+13+10+11","leaf":true},{"id":397,"o":3792,"text":" Aufgaben manuell fortsetzen und anhalten ","url":"3792.htm","node":"3+13+10+12","leaf":true},{"id":398,"o":3961,"text":" AufgabenausfÃ¼hrung Ã¼berwachen ","url":"3961.htm","node":"3+13+10+13","leaf":true},{"id":399,"o":3794,"text":" Auf dem Administrationsserver gespeicherte Ergebnisse der AufgabenausfÃ¼hrung anzeigen ","url":"3794.htm","node":"3+13+10+14","leaf":true},{"id":400,"o":3795,"text":" Filter fÃ¼r die Informationen Ã¼ber die Ergebnisse der AufgabenausfÃ¼hrung konfigurieren ","url":"3795.htm","node":"3+13+10+15","leaf":true},{"id":401,"o":131027,"text":" Ã„ndern der Aufgabe Rollback der Ã„nderungen ","url":"131027.htm","node":"3+13+10+16","leaf":true},{"id":402,"o":144974,"text":" Vergleich von Aufgaben ","url":"144974.htm","node":"3+13+10+17","leaf":true},{"id":403,"o":11352,"text":" Die Benutzerkonten fÃ¼r den Aufgabenstart ","url":"11352.htm","node":"3+13+10+18","leaf":true},{"id":404,"o":295928,"text":" Verlauf der AufgabenausfÃ¼hrung exportieren ","url":"295928.htm","node":"3+13+10+19","leaf":true},{"id":405,"o":192305,"text":" Assistent zum Ã„ndern der AufgabenkennwÃ¶rter ","url":"192305.htm","node":"3+13+10+20","children":[{"id":406,"o":192383,"text":" Schritt 1. Anmeldedaten angeben ","url":"192383.htm","node":"3+13+10+20+0","leaf":true},{"id":407,"o":192740,"text":" Schritt 2. AuszufÃ¼hrenden Vorgang auswÃ¤hlen ","url":"192740.htm","node":"3+13+10+20+1","leaf":true},{"id":408,"o":192752,"text":" Schritt 3. Ergebnisse anzeigen ","url":"192752.htm","node":"3+13+10+20+2","leaf":true}]}]},{"id":409,"o":38042,"text":" Hierarchie der Administrationsgruppen erstellen, die dem virtuellen Administrationsserver untergeordnet sind ","url":"38042.htm","node":"3+13+11","leaf":true},{"id":410,"o":165762,"text":" Richtlinien und Richtlinienprofile ","url":"165762.htm","node":"3+13+12","children":[{"id":411,"o":92432,"text":" Richtlinienhierarchie, Verwendung von Richtlinienprofilen ","url":"92432.htm","node":"3+13+12+0","children":[{"id":412,"o":92433,"text":" Hierarchie der Richtlinien ","url":"92433.htm","node":"3+13+12+0+0","leaf":true},{"id":413,"o":92434,"text":" Richtlinienprofile ","url":"92434.htm","node":"3+13+12+0+1","leaf":true},{"id":414,"o":179787,"text":" Vererbung von Richtlinieneinstellungen ","url":"179787.htm","node":"3+13+12+0+2","leaf":true}]},{"id":415,"o":3746,"text":" Richtlinien verwalten ","url":"3746.htm","node":"3+13+12+1","children":[{"id":416,"o":3747,"text":" Richtlinie erstellen ","url":"3747.htm","node":"3+13+12+1+0","leaf":true},{"id":417,"o":3754,"text":" Vererbte Richtlinie in der untergeordneten Gruppe darstellen ","url":"3754.htm","node":"3+13+12+1+1","leaf":true},{"id":418,"o":3755,"text":" Richtlinien aktivieren ","url":"3755.htm","node":"3+13+12+1+2","leaf":true},{"id":419,"o":3756,"text":" Richtlinie nach dem Ereignis &amp;quot;Virenangriff&amp;quot; automatisch aktivieren ","url":"3756.htm","node":"3+13+12+1+3","leaf":true},{"id":420,"o":3757,"text":" Richtlinie fÃ¼r mobile Benutzer Ã¼bernehmen ","url":"3757.htm","node":"3+13+12+1+4","leaf":true},{"id":421,"o":130755,"text":" Richtlinie Ã¤ndern. Rollback der Ã„nderungen ","url":"130755.htm","node":"3+13+12+1+5","leaf":true},{"id":422,"o":143897,"text":" Vergleich von Richtlinien ","url":"143897.htm","node":"3+13+12+1+6","leaf":true},{"id":423,"o":283023,"text":" Diagramm fÃ¼r den Status der Richtlinienverteilung anzeigen ","url":"283023.htm","node":"3+13+12+1+7","leaf":true},{"id":424,"o":3758,"text":" Richtlinien lÃ¶schen ","url":"3758.htm","node":"3+13+12+1+8","leaf":true},{"id":425,"o":3759,"text":" Richtlinien kopieren ","url":"3759.htm","node":"3+13+12+1+9","leaf":true},{"id":426,"o":3762,"text":" Richtlinien exportieren ","url":"3762.htm","node":"3+13+12+1+10","leaf":true},{"id":427,"o":3763,"text":" Richtlinien importieren ","url":"3763.htm","node":"3+13+12+1+11","leaf":true},{"id":428,"o":17335,"text":" Richtlinien konvertieren ","url":"17335.htm","node":"3+13+12+1+12","leaf":true}]},{"id":429,"o":89258,"text":" Richtlinienprofile verwalten ","url":"89258.htm","node":"3+13+12+2","children":[{"id":430,"o":89259,"text":" Richtlinienprofil erstellen ","url":"89259.htm","node":"3+13+12+2+0","leaf":true},{"id":431,"o":89260,"text":" Richtlinienprofil Ã¤ndern ","url":"89260.htm","node":"3+13+12+2+1","leaf":true},{"id":432,"o":89262,"text":" Richtlinienprofil lÃ¶schen ","url":"89262.htm","node":"3+13+12+2+2","leaf":true},{"id":433,"o":144953,"text":" Regeln fÃ¼r die Aktivierung des Richtlinienprofils erstellen ","url":"144953.htm","node":"3+13+12+2+3","leaf":true}]}]},{"id":434,"o":92437,"text":" Verschiebungsregeln fÃ¼r GerÃ¤te ","url":"92437.htm","node":"3+13+13","leaf":true},{"id":435,"o":171107,"text":" Klonen von Regeln fÃ¼r das Verschieben von GerÃ¤ten ","url":"171107.htm","node":"3+13+14","leaf":true},{"id":436,"o":92438,"text":" Software-Kategorisierung ","url":"92438.htm","node":"3+13+15","leaf":true},{"id":437,"o":38045,"text":" Erforderliche Bedingungen fÃ¼r die Installation von Programmen auf den GerÃ¤ten des Kundenunternehmens ","url":"38045.htm","node":"3+13+16","leaf":true},{"id":438,"o":3764,"text":" Lokale Einstellungen des Programms anzeigen und Ã¤ndern ","url":"3764.htm","node":"3+13+17","leaf":true}]},{"id":439,"o":179056,"text":" Kaspersky Security Center und verwaltete Programme aktualisieren ","url":"179056.htm","node":"3+14","children":[{"id":440,"o":180689,"text":" Szenario: Datenbanken und Programme von Kaspersky regelmÃ¤ÃŸig aktualisieren ","url":"180689.htm","node":"3+14+0","leaf":true},{"id":441,"o":46875,"text":" Ãœber das Aktualisieren der Datenbanken, Software-Module und Programme von Kaspersky ","url":"46875.htm","node":"3+14+1","leaf":true},{"id":442,"o":175487,"text":" Ãœber die Verwendung von Diff-Dateien zum Update von Kaspersky-Datenbanken und Software-Modulen ","url":"175487.htm","node":"3+14+2","leaf":true},{"id":443,"o":219783,"text":" Funktion zum Herunterladen von Diff-Dateien aktivieren ","url":"219783.htm","node":"3+14+3","leaf":true},{"id":444,"o":3411,"text":" Aufgabe zum Download von Updates in die Datenverwaltung des Administrationsservers erstellen ","url":"3411.htm","node":"3+14+4","leaf":true},{"id":445,"o":137601,"text":" Aufgabe zum Download von Updates in die Datenverwaltung der Verteilungspunkte erstellen ","url":"137601.htm","node":"3+14+5","leaf":true},{"id":446,"o":13191,"text":" Einstellungen der Aufgabe zum Download von Updates in die Datenverwaltung des Administrationsservers anpassen ","url":"13191.htm","node":"3+14+6","leaf":true},{"id":447,"o":5251,"text":" Heruntergeladene Updates prÃ¼fen ","url":"5251.htm","node":"3+14+7","leaf":true},{"id":448,"o":52515,"text":" Konfiguration der PrÃ¼fungsrichtlinien und Hilfsaufgaben ","url":"52515.htm","node":"3+14+8","leaf":true},{"id":449,"o":3413,"text":" Heruntergeladene Updates anzeigen ","url":"3413.htm","node":"3+14+9","leaf":true},{"id":450,"o":89280,"text":" Updates fÃ¼r KasperskyÂ&nbsp;EndpointÂ&nbsp;Security automatisch auf den GerÃ¤ten installieren ","url":"89280.htm","node":"3+14+10","leaf":true},{"id":451,"o":101873,"text":" Autonomes Modell fÃ¼r den Download von Updates ","url":"101873.htm","node":"3+14+11","leaf":true},{"id":452,"o":102163,"text":" Autonomes Modell fÃ¼r den Download von Updates aktivieren und deaktivieren ","url":"102163.htm","node":"3+14+12","leaf":true},{"id":453,"o":154857,"text":" Automatische Installation von Updates und Patches fÃ¼r die Komponenten von Kaspersky Security Center ","url":"154857.htm","node":"3+14+13","leaf":true},{"id":454,"o":154853,"text":" Automatische Installation von Updates und Patches fÃ¼r die Komponenten von Kaspersky Security Center aktivieren und deaktivieren ","url":"154853.htm","node":"3+14+14","leaf":true},{"id":455,"o":3415,"text":" Updates automatisch verteilen ","url":"3415.htm","node":"3+14+15","children":[{"id":456,"o":3416,"text":" Updates automatisch auf Client-GerÃ¤te verteilen ","url":"3416.htm","node":"3+14+15+0","leaf":true},{"id":457,"o":3418,"text":" Updates automatisch an sekundÃ¤re Administrationsserver verteilen ","url":"3418.htm","node":"3+14+15+1","leaf":true},{"id":458,"o":193351,"text":" Verteilungspunkte automatisch zuweisen ","url":"193351.htm","node":"3+14+15+2","leaf":true},{"id":459,"o":3420,"text":" GerÃ¤t manuell zum Verteilungspunkt bestimmen ","url":"3420.htm","node":"3+14+15+3","leaf":true},{"id":460,"o":101498,"text":" GerÃ¤t aus der Liste der Verteilungspunkte entfernen ","url":"101498.htm","node":"3+14+15+4","leaf":true},{"id":461,"o":13460,"text":" Updates mittels Verteilungspunkten herunterladen ","url":"13460.htm","node":"3+14+15+5","leaf":true}]},{"id":462,"o":91260,"text":" Software-Updates aus der Datenverwaltung lÃ¶schen ","url":"91260.htm","node":"3+14+16","leaf":true},{"id":463,"o":138256,"text":" Patchinstallation fÃ¼r eine Kaspersky-Anwendung im Cluster-Modell ","url":"138256.htm","node":"3+14+17","leaf":true}]},{"id":464,"o":52336,"text":" Drittanbieter-Programme auf Client-GerÃ¤ten verwalten ","url":"52336.htm","node":"3+15","children":[{"id":465,"o":52464,"text":" Updates fÃ¼r Drittanbieter-Programme installieren ","url":"52464.htm","node":"3+15+0","children":[{"id":466,"o":183968,"text":" Szenario: Aktualisieren von Software von Drittanbietern ","url":"183968.htm","node":"3+15+0+0","leaf":true},{"id":467,"o":61490,"text":" Informationen zu verfÃ¼gbaren Updates fÃ¼r Anwendungen von Drittanbietern anzeigen ","url":"61490.htm","node":"3+15+0+1","leaf":true},{"id":468,"o":155093,"text":" Programm-Updates genehmigen und ablehnen ","url":"155093.htm","node":"3+15+0+2","leaf":true},{"id":469,"o":61470,"text":" Windows-Updates mit dem Administrationsserver synchronisieren ","url":"61470.htm","node":"3+15+0+3","children":[{"id":470,"o":150232,"text":" Schritt 1. Festlegen, ob der Datenverkehr reduziert werden soll ","url":"150232.htm","node":"3+15+0+3+0","leaf":true},{"id":471,"o":150233,"text":" Schritt 2. Anwendungen ","url":"150233.htm","node":"3+15+0+3+1","leaf":true},{"id":472,"o":150238,"text":" Schritt 3. Update-Kategorien ","url":"150238.htm","node":"3+15+0+3+2","leaf":true},{"id":473,"o":150240,"text":" Schritt 4. Update-Sprachen ","url":"150240.htm","node":"3+15+0+3+3","leaf":true},{"id":474,"o":150258,"text":" Schritt 5. AuswÃ¤hlen des  Kontos fÃ¼r AufgabenausfÃ¼hrung ","url":"150258.htm","node":"3+15+0+3+4","leaf":true},{"id":475,"o":150260,"text":" Schritt 6. Konfigurieren des Zeitplans fÃ¼r den Aufgabenstart ","url":"150260.htm","node":"3+15+0+3+5","leaf":true},{"id":476,"o":150263,"text":" Schritt 7. Festlegen des Aufgabennamens ","url":"150263.htm","node":"3+15+0+3+6","leaf":true},{"id":477,"o":150264,"text":" Schritt 8. AbschlieÃŸen der Aufgabenerstellung ","url":"150264.htm","node":"3+15+0+3+7","leaf":true}]},{"id":478,"o":61471,"text":" Manuelle Installation von Updates auf GerÃ¤te ","url":"61471.htm","node":"3+15+0+4","leaf":true},{"id":479,"o":61495,"text":" Windows-Updates in der Richtlinie des Administrationsagenten anpassen ","url":"61495.htm","node":"3+15+0+5","leaf":true}]},{"id":480,"o":52462,"text":" Schwachstellen in Drittanbieter-Anwendungen schlieÃŸen ","url":"52462.htm","node":"3+15+1","children":[{"id":481,"o":184124,"text":" Szenario: Finden und SchlieÃŸen von Schwachstellen in Programmen von Drittanbietern ","url":"184124.htm","node":"3+15+1+0","leaf":true},{"id":482,"o":183975,"text":" Ãœber die Suche nach und das SchlieÃŸen von Software-Schwachstellen ","url":"183975.htm","node":"3+15+1+1","leaf":true},{"id":483,"o":61501,"text":" Informationen Ã¼ber Schwachstellen in Programmen anzeigen ","url":"61501.htm","node":"3+15+1+2","leaf":true},{"id":484,"o":191658,"text":" Statistik Ã¼ber Schwachstellen auf verwalteten GerÃ¤ten anzeigen ","url":"191658.htm","node":"3+15+1+3","leaf":true},{"id":485,"o":61502,"text":" Schwachstellensuche in Programmen ","url":"61502.htm","node":"3+15+1+4","leaf":true},{"id":486,"o":61947,"text":" SchlieÃŸen von Schwachstellen in Programmen ","url":"61947.htm","node":"3+15+1+5","leaf":true},{"id":487,"o":230885,"text":" Schwachstellen in einem isolierten Netzwerk schlieÃŸen ","url":"230885.htm","node":"3+15+1+6","children":[{"id":488,"o":230670,"text":" Szenario: Schwachstellen in Drittanbieter-Programmen in einem isolierten Netzwerk beheben ","url":"230670.htm","node":"3+15+1+6+0","leaf":true},{"id":489,"o":231854,"text":" Ãœber das Beheben von Schwachstellen in Programmen von Drittanbietern in einem isolierten Netzwerk ","url":"231854.htm","node":"3+15+1+6+1","leaf":true},{"id":490,"o":230729,"text":" Administrationsserver mit Internetzugang konfigurieren, um Schwachstellen in einem isolierten Netzwerk zu schlieÃŸen ","url":"230729.htm","node":"3+15+1+6+2","leaf":true},{"id":491,"o":230777,"text":" Isolierte Administrationsserver konfigurieren, um Schwachstellen in einem isolierten Netzwerk zu schlieÃŸen ","url":"230777.htm","node":"3+15+1+6+3","leaf":true},{"id":492,"o":230781,"text":" Ãœbertragung von Patches und Installation von Updates in einem isolierten Netzwerk ","url":"230781.htm","node":"3+15+1+6+4","leaf":true},{"id":493,"o":230869,"text":" Option zum Ãœbertragen von Patches und Installieren von Updates in einem isolierten Netzwerk deaktivieren ","url":"230869.htm","node":"3+15+1+6+5","leaf":true}]},{"id":494,"o":191582,"text":" Ignorieren von Schwachstellen in Programmen ","url":"191582.htm","node":"3+15+1+7","leaf":true},{"id":495,"o":191616,"text":" AuswÃ¤hlen von Benutzerkorrekturen fÃ¼r Schwachstellen in Programmen von Drittanbietern ","url":"191616.htm","node":"3+15+1+8","leaf":true},{"id":496,"o":172909,"text":" Regeln zur Installation von Updates ","url":"172909.htm","node":"3+15+1+9","leaf":true}]},{"id":497,"o":62749,"text":" Programmgruppen ","url":"62749.htm","node":"3+15+2","children":[{"id":498,"o":297730,"text":" Programmkontrolle zur Verwaltung ausfÃ¼hrbarer Dateien verwenden ","url":"183681.htm","node":"3+15+2+0","leaf":true},{"id":499,"o":295859,"text":" Liste der auf Client-GerÃ¤ten gespeicherten ausfÃ¼hrbaren Dateien abrufen und anzeigen ","url":"295859.htm","node":"3+15+2+1","leaf":true},{"id":500,"o":52459,"text":" Erstellen von Programmkategorien fÃ¼r Richtlinien von Kaspersky Endpoint Security fÃ¼r Windows ","url":"52459.htm","node":"3+15+2+2","leaf":true},{"id":501,"o":154440,"text":" Manuell zu erweiternde Programmkategorie erstellen ","url":"154440.htm","node":"3+15+2+3","leaf":true},{"id":502,"o":245879,"text":" Programmkategorie mit ausfÃ¼hrbaren Dateien von ausgewÃ¤hlten GerÃ¤ten erstellen ","url":"245879.htm","node":"3+15+2+4","leaf":true},{"id":503,"o":245886,"text":" Erstellen einer Programmkategorie mit ausfÃ¼hrbaren Dateien aus einem bestimmten Ordner ","url":"245886.htm","node":"3+15+2+5","leaf":true},{"id":504,"o":158577,"text":" Ereignisbezogene ausfÃ¼hrbare Dateien zur Programmkategorie hinzufÃ¼gen ","url":"158577.htm","node":"3+15+2+6","leaf":true},{"id":505,"o":62745,"text":" Verwaltung des Programmstarts auf Client-GerÃ¤ten anpassen ","url":"62745.htm","node":"3+15+2+7","leaf":true},{"id":506,"o":67884,"text":" Ergebnisse der statischen Analyse der Regeln fÃ¼r den Start ausfÃ¼hrbarer Dateien anzeigen ","url":"67884.htm","node":"3+15+2+8","leaf":true},{"id":507,"o":3659,"text":" Programm-Registry anzeigen ","url":"3659.htm","node":"3+15+2+9","leaf":true},{"id":508,"o":102270,"text":" Startzeit der Software-Inventur Ã¤ndern ","url":"102270.htm","node":"3+15+2+10","leaf":true},{"id":509,"o":204199,"text":" Ãœber die Verwaltung von LizenzschlÃ¼sseln von Drittanbieter-Programmen ","url":"62835.htm","node":"3+15+2+11","leaf":true},{"id":510,"o":62748,"text":" Lizenzierte Programmgruppen erstellen ","url":"62748.htm","node":"3+15+2+12","leaf":true},{"id":511,"o":62754,"text":" Verwaltung von LizenzschlÃ¼sseln fÃ¼r lizenzierte Programmgruppen ","url":"62754.htm","node":"3+15+2+13","leaf":true},{"id":512,"o":102357,"text":" Inventarisierung der ausfÃ¼hrbaren Dateien ","url":"102357.htm","node":"3+15+2+14","leaf":true},{"id":513,"o":52460,"text":" Informationen Ã¼ber ausfÃ¼hrbare Dateien anzeigen ","url":"52460.htm","node":"3+15+2+15","leaf":true}]}]},{"id":514,"o":179074,"text":" Ãœberwachung und Berichterstattung ","url":"179074.htm","node":"3+16","children":[{"id":515,"o":214326,"text":" Szenario: Ãœberwachung und Berichterstattung ","url":"214326.htm","node":"3+16+0","leaf":true},{"id":516,"o":92536,"text":" Farbliche Kennzeichnungen und protokollierte Ereignissen in der Verwaltungskonsole Ã¼berwachen ","url":"92536.htm","node":"3+16+1","leaf":true},{"id":517,"o":3635,"text":" Arbeiten mit Berichten, Statistiken und Benachrichtigungen ","url":"3635.htm","node":"3+16+2","children":[{"id":518,"o":52059,"text":" Arbeiten mit Berichten ","url":"52059.htm","node":"3+16+2+0","children":[{"id":519,"o":3636,"text":" Berichtsvorlage erstellen ","url":"3636.htm","node":"3+16+2+0+0","leaf":true},{"id":520,"o":174017,"text":" Eigenschaften von Berichtsvorlagen anzeigen und bearbeiten ","url":"174017.htm","node":"3+16+2+0+1","leaf":true},{"id":521,"o":189575,"text":" Erweitertes Filterformat in Berichtsvorlagen ","url":"189575.htm","node":"3+16+2+0+2","children":[{"id":522,"o":189734,"text":" Filter in das erweiterte Filterformat konvertieren ","url":"189734.htm","node":"3+16+2+0+2+0","leaf":true},{"id":523,"o":189735,"text":" Erweiterten Filter anpassen ","url":"189735.htm","node":"3+16+2+0+2+1","leaf":true}]},{"id":524,"o":3638,"text":" Berichte erstellen und anzeigen ","url":"3638.htm","node":"3+16+2+0+3","leaf":true},{"id":525,"o":52064,"text":" Bericht speichern ","url":"52064.htm","node":"3+16+2+0+4","leaf":true},{"id":526,"o":3639,"text":" Aufgabe zum Berichtsversand anlegen ","url":"3639.htm","node":"3+16+2+0+5","children":[{"id":527,"o":151874,"text":" Schritt 1. AuswÃ¤hlen des Aufgabentyps ","url":"151874.htm","node":"3+16+2+0+5+0","leaf":true},{"id":528,"o":151875,"text":" Schritt 2. AuswÃ¤hlen des Berichtstyps ","url":"151875.htm","node":"3+16+2+0+5+1","leaf":true},{"id":529,"o":151876,"text":" Schritt 3. VorgÃ¤nge mit Berichten ","url":"151876.htm","node":"3+16+2+0+5+2","leaf":true},{"id":530,"o":151877,"text":" Schritt 4. AuswÃ¤hlen des  Kontos fÃ¼r AufgabenausfÃ¼hrung ","url":"151877.htm","node":"3+16+2+0+5+3","leaf":true},{"id":531,"o":151878,"text":" Schritt 5. Konfigurieren eines Aufgabenzeitplans ","url":"151878.htm","node":"3+16+2+0+5+4","leaf":true},{"id":532,"o":151879,"text":" Schritt 6. Festlegen des Aufgabennamens ","url":"151879.htm","node":"3+16+2+0+5+5","leaf":true},{"id":533,"o":151880,"text":" Schritt 7. AbschlieÃŸen der Aufgabenerstellung ","url":"151880.htm","node":"3+16+2+0+5+6","leaf":true}]}]},{"id":534,"o":10592,"text":" Arbeiten mit statistischen Daten ","url":"10592.htm","node":"3+16+2+1","leaf":true},{"id":535,"o":4944,"text":" Benachrichtigungseinstellungen fÃ¼r Ereignisse anpassen ","url":"4944_1.htm","node":"3+16+2+2","leaf":true},{"id":536,"o":110329,"text":" Zertifikat fÃ¼r SMTP-Server erstellen ","url":"110329.htm","node":"3+16+2+3","leaf":true},{"id":537,"o":3628,"text":" Ereignisauswahlen ","url":"3628.htm","node":"3+16+2+4","children":[{"id":538,"o":3629,"text":" Ereignisauswahl anzeigen ","url":"3629.htm","node":"3+16+2+4+0","leaf":true},{"id":539,"o":3632,"text":" Einstellungen fÃ¼r Ereignisauswahl anpassen ","url":"3632.htm","node":"3+16+2+4+1","leaf":true},{"id":540,"o":3631,"text":" Ereignisauswahl erstellen ","url":"3631.htm","node":"3+16+2+4+2","leaf":true},{"id":541,"o":3633,"text":" Ereignisauswahl in eine Textdatei exportieren ","url":"3633.htm","node":"3+16+2+4+3","leaf":true},{"id":542,"o":3634,"text":" Ereignisse aus einer Auswahl lÃ¶schen ","url":"3634.htm","node":"3+16+2+4+4","leaf":true},{"id":543,"o":173819,"text":" Programme auf Anfrage von Benutzern zu AusschlÃ¼ssen hinzufÃ¼gen ","url":"173819.htm","node":"3+16+2+4+5","leaf":true}]},{"id":544,"o":3652,"text":" GerÃ¤teauswahlen ","url":"3652.htm","node":"3+16+2+5","children":[{"id":545,"o":3654,"text":" GerÃ¤teauswahl anzeigen ","url":"3654.htm","node":"3+16+2+5+0","leaf":true},{"id":546,"o":150668,"text":" Einstellungen einer GerÃ¤teauswahl anpassen ","url":"150668.htm","node":"3+16+2+5+1","leaf":true},{"id":547,"o":52127,"text":" Einstellungen einer GerÃ¤teauswahl in eine Datei exportieren ","url":"52127.htm","node":"3+16+2+5+2","leaf":true},{"id":548,"o":3655,"text":" GerÃ¤teauswahl erstellen ","url":"3655.htm","node":"3+16+2+5+3","leaf":true},{"id":549,"o":52128,"text":" GerÃ¤teauswahl mit importierten Einstellungen erstellen ","url":"52128.htm","node":"3+16+2+5+4","leaf":true},{"id":550,"o":52130,"text":" GerÃ¤te in der Auswahl aus Administrationsgruppen lÃ¶schen ","url":"52130.htm","node":"3+16+2+5+5","leaf":true}]}]},{"id":551,"o":191308,"text":" Ãœberwachung der Installation und Deinstallation von Anwendungen ","url":"191308.htm","node":"3+16+3","leaf":true},{"id":552,"o":151336,"text":" Ereignisse der Komponenten von Kaspersky Security Center ","url":"151336.htm","node":"3+16+4","children":[{"id":553,"o":181756,"text":" Datenstruktur der Beschreibungen von Ereignistypen ","url":"181756.htm","node":"3+16+4+0","leaf":true},{"id":554,"o":184666,"text":" Ereignisse des Administrationsservers ","url":"184666.htm","node":"3+16+4+1","children":[{"id":555,"o":177080,"text":" Ereignisse des Administrationsservers: Kritisch ","url":"177080.htm","node":"3+16+4+1+0","leaf":true},{"id":556,"o":177081,"text":" Ereignisse des Administrationsservers: Funktionsfehler ","url":"177081.htm","node":"3+16+4+1+1","leaf":true},{"id":557,"o":177082,"text":" Ereignisse des Administrationsservers: Warnung ","url":"177082.htm","node":"3+16+4+1+2","leaf":true},{"id":558,"o":237790,"text":" Ereignisse des Administrationsservers: Information ","url":"237790.htm","node":"3+16+4+1+3","leaf":true}]},{"id":559,"o":184667,"text":" Ereignisse des Administrationsagenten ","url":"184667.htm","node":"3+16+4+2","children":[{"id":560,"o":165484,"text":" Administrationsagent: Ereignisse bei Funktionsfehlern ","url":"165484.htm","node":"3+16+4+2+0","leaf":true},{"id":561,"o":173538,"text":" Ereignisse des Administrationsagenten: Warnung ","url":"173538.htm","node":"3+16+4+2+1","leaf":true},{"id":562,"o":173727,"text":" Ereignisse des Administrationsagenten: Information ","url":"173727.htm","node":"3+16+4+2+2","leaf":true}]},{"id":563,"o":184668,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers ","url":"184668.htm","node":"3+16+4+3","children":[{"id":564,"o":177141,"text":" Ereignisse des iOS MDM-Servers: Funktionsfehler ","url":"177141.htm","node":"3+16+4+3+0","leaf":true},{"id":565,"o":177143,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers: Warnung ","url":"177143.htm","node":"3+16+4+3+1","leaf":true},{"id":566,"o":177142,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers: Information ","url":"177142.htm","node":"3+16+4+3+2","leaf":true}]}]},{"id":567,"o":212869,"text":" HÃ¤ufige auftretende Ereignisse blockieren ","url":"212869.htm","node":"3+16+5","children":[{"id":568,"o":213112,"text":" Ãœber das Blockieren von hÃ¤ufig auftretenden Ereignissen ","url":"213112.htm","node":"3+16+5+0","leaf":true},{"id":569,"o":212442,"text":" Das Blockieren hÃ¤ufig auftretender Ereignissen verwalten ","url":"212442.htm","node":"3+16+5+1","leaf":true},{"id":570,"o":212556,"text":" Die Blockade hÃ¤ufig auftretender Ereignisse aufheben ","url":"212556.htm","node":"3+16+5+2","leaf":true},{"id":571,"o":212655,"text":" Eine Liste der hÃ¤ufig auftretenden Ereignisse in eine Datei exportieren ","url":"212655.htm","node":"3+16+5+3","leaf":true}]},{"id":572,"o":75895,"text":" Kontrolle Ã¼ber den Status der virtuellen Maschinen ","url":"75895.htm","node":"3+16+6","leaf":true},{"id":573,"o":3644,"text":" Status des Antiviren-Schutzes mit Systemregistrierung verfolgen ","url":"3644.htm","node":"3+16+7","leaf":true},{"id":574,"o":173912,"text":" MaÃŸnahmen anzeigen und konfigurieren, wenn GerÃ¤te als inaktiv angezeigt werden ","url":"173912.htm","node":"3+16+8","leaf":true},{"id":575,"o":214003,"text":" Kaspersky-Mitteilungen deaktivieren ","url":"214003.htm","node":"3+16+9","leaf":true}]},{"id":576,"o":92429,"text":" Verteilungspunkte und Verbindungs-Gateways anpassen ","url":"92429.htm","node":"3+17","children":[{"id":577,"o":92430,"text":" Typische Konfiguration von Verteilungspunkten: EinzelbÃ¼ro ","url":"92430.htm","node":"3+17+0","leaf":true},{"id":578,"o":92431,"text":" Typische Konfiguration von Verteilungspunkten: Mehrere kleine, eigenstÃ¤ndige BÃ¼ros ","url":"92431.htm","node":"3+17+1","leaf":true},{"id":579,"o":38043,"text":" Zuweisen eines verwalteten GerÃ¤ts als Verteilungspunkt ","url":"38043.htm","node":"3+17+2","leaf":true},{"id":580,"o":203996,"text":" Verbinden eines Linux-GerÃ¤tes als Gateway in einer demilitarisierten Zone ","url":"203996.htm","node":"3+17+3","leaf":true},{"id":581,"o":203997,"text":" Verbinden eines Linux-GerÃ¤ts mit dem Administrationsserver Ã¼ber ein Verbindungs-Gateway ","url":"203997.htm","node":"3+17+4","leaf":true},{"id":582,"o":204253,"text":" HinzufÃ¼gen eines Verbindungs-Gateways als Verteilungspunkt innerhalb der DMZ ","url":"204253.htm","node":"3+17+5","leaf":true},{"id":583,"o":193351,"text":" Verteilungspunkte automatisch zuweisen ","url":"193351_1.htm","node":"3+17+6","leaf":true},{"id":584,"o":38101,"text":" Administrationsagenten lokal auf dem als Verteilungspunkt ausgewÃ¤hlten GerÃ¤t installieren ","url":"38101.htm","node":"3+17+7","leaf":true},{"id":585,"o":45902,"text":" Verteilungspunkt als Verbindungs-Gateway verwenden ","url":"45902.htm","node":"3+17+8","leaf":true},{"id":586,"o":171984,"text":" Weitere IP-Bereiche zur Liste mit Bereichen hinzufÃ¼gen, die von einem Verteilungspunkt abgefragt werden ","url":"171984.htm","node":"3+17+9","leaf":true},{"id":587,"o":219573,"text":" Verteilungspunkt als Push-Server verwenden ","url":"219573.htm","node":"3+17+10","leaf":true}]},{"id":588,"o":92535,"text":" Weitere Routinearbeiten ","url":"92535.htm","node":"3+18","children":[{"id":589,"o":46973,"text":" Administrationsserver verwalten ","url":"46973.htm","node":"3+18+0","children":[{"id":590,"o":160043,"text":" Hierarchie der Administrationsserver erstellen: einen sekundÃ¤ren Administrationsserver hinzufÃ¼gen ","url":"160043.htm","node":"3+18+0+0","leaf":true},{"id":591,"o":3874,"text":" Verbindung mit dem Administrationsserver herstellen und zwischen Administrationsservern wechseln ","url":"3874.htm","node":"3+18+0+1","leaf":true},{"id":592,"o":3326,"text":" Zugriffsberechtigungen fÃ¼r den Administrationsserver und dessen Objekte ","url":"3326.htm","node":"3+18+0+2","leaf":true},{"id":593,"o":13051,"text":" Bedingungen fÃ¼r das Herstellen einer Internetverbindung mit dem Administrationsserver ","url":"13051.htm","node":"3+18+0+3","leaf":true},{"id":594,"o":3321,"text":" GeschÃ¼tzte Verbindung mit dem Administrationsserver einrichten ","url":"3321.htm","node":"3+18+0+4","children":[{"id":595,"o":3324,"text":" Authentifizierung des Administrationsservers beim Verbinden des GerÃ¤ts ","url":"3324.htm","node":"3+18+0+4+0","leaf":true},{"id":596,"o":3323,"text":" Authentifizierung des Administrationsservers beim Verbindungsaufbau mit der Verwaltungskonsole ","url":"3323.htm","node":"3+18+0+4+1","leaf":true}]},{"id":597,"o":231374,"text":" Eine Allow-Liste von IP-Adressen fÃ¼r die Verbindung mit dem Administrationsserver konfigurieren ","url":"231374.htm","node":"3+18+0+5","leaf":true},{"id":598,"o":233113,"text":" Klscflag-Tool zum SchlieÃŸen von Port 13291 verwenden ","url":"233113.htm","node":"3+18+0+6","leaf":true},{"id":599,"o":3875,"text":" Verbindung mit dem Administrationsserver trennen ","url":"3875.htm","node":"3+18+0+7","leaf":true},{"id":600,"o":3877,"text":" Administrationsserver zur Konsolenstruktur hinzufÃ¼gen ","url":"3877.htm","node":"3+18+0+8","leaf":true},{"id":601,"o":3878,"text":" Administrationsserver aus der Konsolenstruktur entfernen ","url":"3878.htm","node":"3+18+0+9","leaf":true},{"id":602,"o":152698,"text":" HinzufÃ¼gen eines virtuellen Administrationsservers zur Konsolenstruktur hinzufÃ¼gen ","url":"152698.htm","node":"3+18+0+10","leaf":true},{"id":603,"o":13053,"text":" Benutzerkonto des Administrationsserver-Dienstes wechseln. Tool klsrvswch ","url":"13053.htm","node":"3+18+0+11","leaf":true},{"id":604,"o":210175,"text":" DBMS-Anmeldedaten Ã¤ndern ","url":"210175.htm","node":"3+18+0+12","leaf":true},{"id":605,"o":247156,"text":" Den freigegebenen Ordner des Administrationsservers Ã¤ndern ","url":"247156.htm","node":"3+18+0+13","leaf":true},{"id":606,"o":179567,"text":" Probleme mit den Knoten des Administrationsservers lÃ¶sen ","url":"179567.htm","node":"3+18+0+14","leaf":true},{"id":607,"o":4620,"text":" Einstellungen des Administrationsservers anzeigen und Ã¤ndern ","url":"4620.htm","node":"3+18+0+15","children":[{"id":608,"o":3768,"text":" Allgemeine Einstellungen des Administrationsservers konfigurieren ","url":"3768.htm","node":"3+18+0+15+0","leaf":true},{"id":609,"o":184037,"text":" Schnittstelleneinstellungen der Verwaltungskonsole ","url":"184037.htm","node":"3+18+0+15+1","leaf":true},{"id":610,"o":30023,"text":" Ereignisse auf dem Administrationsserver verarbeiten und speichern ","url":"30023.htm","node":"3+18+0+15+2","leaf":true},{"id":611,"o":175099,"text":" Protokoll der Verbindungen zum Administrationsserver anzeigen ","url":"175099.htm","node":"3+18+0+15+3","leaf":true},{"id":612,"o":3154,"text":" Eintreten von Virenangriffen kontrollieren ","url":"3154.htm","node":"3+18+0+15+4","leaf":true},{"id":613,"o":5183,"text":" Datenverkehr begrenzen ","url":"5483.htm","node":"3+18+0+15+5","leaf":true},{"id":614,"o":73862,"text":" Webserver-Einstellungen anpassen ","url":"73862.htm","node":"3+18+0+15+6","leaf":true},{"id":615,"o":45873,"text":" Arbeit mit internen Benutzern ","url":"45873.htm","node":"3+18+0+15+7","leaf":true}]},{"id":616,"o":92439,"text":" Verschieben ins Backup und Wiederherstellen der Einstellungen des Administrationsservers ","url":"92439.htm","node":"3+18+0+16","children":[{"id":617,"o":160842,"text":" Nutzung von Momentaufnahmen des Dateisystems zur VerkÃ¼rzung der Dauer des Verschiebens ins Backup ","url":"160842.htm","node":"3+18+0+16+0","leaf":true},{"id":618,"o":92442,"text":" Ein GerÃ¤t mit dem Administrationsserver ist ausgefallen ","url":"92442.htm","node":"3+18+0+16+1","leaf":true},{"id":619,"o":92443,"text":" Die Einstellungen des Administrationsservers oder der Datenbank sind beschÃ¤digt ","url":"92443.htm","node":"3+18+0+16+2","leaf":true}]},{"id":620,"o":3667,"text":" Daten des Administrationsservers sichern und wiederherstellen ","url":"3667.htm","node":"3+18+0+17","children":[{"id":621,"o":3670,"text":" Aufgabe zum Anlegen eines Backups der Daten des Administrationsservers ","url":"3670.htm","node":"3+18+0+17+0","leaf":true},{"id":622,"o":3673,"text":" Tool zur Sicherung- und Wiederherstellung der Daten (klbackup) ","url":"3673.htm","node":"3+18+0+17+1","leaf":true},{"id":623,"o":13288,"text":" Anlegen und Wiederherstellen eines Daten-Backups im interaktiven Modus ","url":"13288.htm","node":"3+18+0+17+2","leaf":true},{"id":624,"o":3674,"text":" Daten im Silent-Modus sichern, kopieren und wiederherstellen ","url":"3674.htm","node":"3+18+0+17+3","leaf":true},{"id":625,"o":294180,"text":" Das klbackup-Tool verwenden, um verwaltete GerÃ¤te unter die Verwaltung eines anderen Administrationsservers zu stellen ","url":"294180.htm","node":"3+18+0+17+4","leaf":true},{"id":626,"o":294564,"text":" Daten des Administrationsservers bei Verwendung von MySQL oder MariaDB sichern und wiederherstellen ","url":"294564.htm","node":"3+18+0+17+5","leaf":true},{"id":627,"o":298152,"text":" Erstellen und Wiederherstellen eines Backups der Daten des Administrationsservers optimieren ","url":"298152.htm","node":"3+18+0+17+6","leaf":true}]},{"id":628,"o":294125,"text":" Migration auf KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;Linux mittels Daten-Backups des Administrationsservers ","url":"294125.htm","node":"3+18+0+18","leaf":true},{"id":629,"o":3675,"text":" Administrationsserver auf anderes GerÃ¤t Ã¼bertragen ","url":"3675.htm","node":"3+18+0+19","leaf":true},{"id":630,"o":175419,"text":" Konflikte zwischen mehreren Administrationsservern vermeiden ","url":"175419.htm","node":"3+18+0+20","leaf":true},{"id":631,"o":211796,"text":" Zweistufige ÃœberprÃ¼fung ","url":"211796.htm","node":"3+18+0+21","children":[{"id":632,"o":211948,"text":" Szenario: Zweistufigen ÃœberprÃ¼fung fÃ¼r alle Benutzer konfigurieren ","url":"211948.htm","node":"3+18+0+21+0","leaf":true},{"id":633,"o":211797,"text":" Ãœber die zweistufige ÃœberprÃ¼fung ","url":"211797.htm","node":"3+18+0+21+1","leaf":true},{"id":634,"o":211803,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r Ihr eigenes Benutzerkonto aktivieren ","url":"211803.htm","node":"3+18+0+21+2","leaf":true},{"id":635,"o":211813,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r alle Benutzer aktivieren ","url":"211813.htm","node":"3+18+0+21+3","leaf":true},{"id":636,"o":211804,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r ein Benutzerkonto deaktivieren ","url":"211804.htm","node":"3+18+0+21+4","leaf":true},{"id":637,"o":211907,"text":" Obligatorische zweistufige ÃœberprÃ¼fung fÃ¼r alle Benutzer deaktivieren ","url":"211907.htm","node":"3+18+0+21+5","leaf":true},{"id":638,"o":211812,"text":" Benutzerkonten von der zweistufigen ÃœberprÃ¼fung ausschlieÃŸen ","url":"211812.htm","node":"3+18+0+21+6","leaf":true},{"id":639,"o":211906,"text":" Name eines Sicherheitscode-Ausstellers bearbeiten ","url":"211906.htm","node":"3+18+0+21+7","leaf":true},{"id":640,"o":256942,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r Ihr eigenes Benutzerkonto konfigurieren ","url":"256942.htm","node":"3+18+0+21+8","leaf":true}]}]},{"id":641,"o":46974,"text":" Administrationsgruppen verwalten ","url":"46974.htm","node":"3+18+1","children":[{"id":642,"o":3181,"text":" Administrationsgruppen anlegen ","url":"3181.htm","node":"3+18+1+0","leaf":true},{"id":643,"o":4616,"text":" Administrationsgruppen verschieben ","url":"4616.htm","node":"3+18+1+1","leaf":true},{"id":644,"o":51393,"text":" Deleting administration groups ","url":"51393.htm","node":"3+18+1+2","leaf":true},{"id":645,"o":11634,"text":" Administrationsgruppenstruktur automatisch anlegen ","url":"11634.htm","node":"3+18+1+3","leaf":true},{"id":646,"o":4626,"text":" Programme automatisch auf GerÃ¤ten einer Administrationsgruppe installieren ","url":"4626.htm","node":"3+18+1+4","leaf":true}]},{"id":647,"o":3907,"text":" Client-GerÃ¤te verwalten ","url":"3907.htm","node":"3+18+2","children":[{"id":648,"o":3320,"text":" Client-GerÃ¤te mit dem Administrationsserver verbinden ","url":"3320.htm","node":"3+18+2+0","leaf":true},{"id":649,"o":3911,"text":" Client-GerÃ¤t manuell mit Administrationsserver verbinden. Tool klmover ","url":"3911.htm","node":"3+18+2+1","leaf":true},{"id":650,"o":45925,"text":" Verbindung des Client-GerÃ¤ts mit dem Administrationsserver tunneln ","url":"45925.htm","node":"3+18+2+2","leaf":true},{"id":651,"o":80160,"text":" Remotedesktopverbindung mit dem Client-GerÃ¤t herstellen ","url":"80160.htm","node":"3+18+2+3","children":[{"id":652,"o":238373,"text":" Eine Verbindung mit Windows-Client-GerÃ¤ten herstellen ","url":"238373.htm","node":"3+18+2+3+0","leaf":true},{"id":653,"o":238374,"text":" Eine Verbindung mit macOS-Client-GerÃ¤ten herstellen ","url":"238374.htm","node":"3+18+2+3+1","leaf":true}]},{"id":654,"o":63934,"text":" Verbindung mit den Client-GerÃ¤ten Ã¼ber die WindowsÂ&nbsp;Desktopfreigabe herstellen ","url":"63934.htm","node":"3+18+2+4","leaf":true},{"id":655,"o":90378,"text":" Einstellungen fÃ¼r den Neustart des Client-GerÃ¤ts ","url":"90378.htm","node":"3+18+2+5","leaf":true},{"id":656,"o":89263,"text":" Ãœberwachung der Aktionen auf einem Remote-Client-GerÃ¤t ","url":"89263.htm","node":"3+18+2+6","leaf":true},{"id":657,"o":11645,"text":" Verbindung des Client-GerÃ¤ts mit dem Administrationsserver prÃ¼fen ","url":"11645.htm","node":"3+18+2+7","children":[{"id":658,"o":94171,"text":" Verbindung des Client-GerÃ¤ts mit dem Administrationsserver automatisch prÃ¼fen ","url":"94171.htm","node":"3+18+2+7+0","leaf":true},{"id":659,"o":3912,"text":" Verbindung des Client-GerÃ¤ts mit dem Administrationsserver manuell prÃ¼fen. Tool klnagchk ","url":"3912.htm","node":"3+18+2+7+1","leaf":true},{"id":660,"o":92539,"text":" Ãœber das ÃœberprÃ¼fen der Verbindungszeit des GerÃ¤ts mit dem Administrationsserver ","url":"92539.htm","node":"3+18+2+7+2","leaf":true}]},{"id":661,"o":3325,"text":" Client-GerÃ¤te auf dem Administrationsserver identifizieren ","url":"3325.htm","node":"3+18+2+8","leaf":true},{"id":662,"o":3908,"text":" Verschieben von GerÃ¤ten zu Administrationsgruppe ","url":"3908.htm","node":"3+18+2+9","leaf":true},{"id":663,"o":3910,"text":" Den Administrationsserver fÃ¼r Client-GerÃ¤te Ã¤ndern ","url":"3910.htm","node":"3+18+2+10","leaf":true},{"id":664,"o":292705,"text":" GerÃ¤te, die Ã¼ber Verbindungs-Gateways mit dem Administrationsserver verbunden sind, auf einen anderen Administrationsserver verschieben ","url":"292705.htm","node":"3+18+2+11","leaf":true},{"id":665,"o":11128,"text":" Server-Cluster und -Arrays ","url":"11128.htm","node":"3+18+2+12","leaf":true},{"id":666,"o":10304,"text":" Client-GerÃ¤te von einem entfernten Standort einschalten, ausschalten und Neustart durchfÃ¼hren ","url":"10304.htm","node":"3+18+2+13","leaf":true},{"id":667,"o":92538,"text":" Ãœber die Verwendung einer dauerhaften Verbindung zwischen dem verwalteten GerÃ¤t und dem Administrationsserver ","url":"92538.htm","node":"3+18+2+14","leaf":true},{"id":668,"o":92540,"text":" Ãœber erzwungene Synchronisierung ","url":"92540.htm","node":"3+18+2+15","leaf":true},{"id":669,"o":94301,"text":" Ãœber den Zeitplan der Verbindung ","url":"94301.htm","node":"3+18+2+16","leaf":true},{"id":670,"o":10379,"text":" Nachricht an GerÃ¤tenutzer senden ","url":"10379.htm","node":"3+18+2+17","leaf":true},{"id":671,"o":67204,"text":" Arbeit mit dem Programm Kaspersky Security for Virtualization ","url":"67204.htm","node":"3+18+2+18","leaf":true},{"id":672,"o":144383,"text":" Wechsel der Statuswerte von GerÃ¤ten konfigurieren ","url":"144383.htm","node":"3+18+2+19","leaf":true},{"id":673,"o":99853,"text":" Zuweisung von Tags an die GerÃ¤te die Anzeige der zugewiesenen Tags ","url":"99853.htm","node":"3+18+2+20","children":[{"id":674,"o":147191,"text":" GerÃ¤ten automatisch Tags zuweisen ","url":"147191.htm","node":"3+18+2+20+0","leaf":true},{"id":675,"o":147192,"text":" Anzeige und Einstellungen von Tags, die dem GerÃ¤t zugewiesen sind ","url":"147192.htm","node":"3+18+2+20+1","leaf":true}]},{"id":676,"o":13052,"text":" Ferndiagnose der Client-GerÃ¤te. KasperskyÂ&nbsp;SecurityÂ&nbsp;Center Ferndiagnosetool ","url":"13052.htm","node":"3+18+2+21","children":[{"id":677,"o":52032,"text":" Ferndiagnosetool mit dem Client-GerÃ¤t verbinden ","url":"52032.htm","node":"3+18+2+21+0","leaf":true},{"id":678,"o":286975,"text":" Erzeugen einer Dump-Datei fÃ¼r eine Anwendung ","url":"286975.htm","node":"3+18+2+21+1","leaf":true},{"id":679,"o":13238,"text":" Ablaufverfolgung aktivieren und deaktivieren, Protokolldatei downloaden ","url":"13238.htm","node":"3+18+2+21+2","leaf":true},{"id":680,"o":13244,"text":" Anwendungseinstellungen herunterladen ","url":"13244.htm","node":"3+18+2+21+3","leaf":true},{"id":681,"o":13251,"text":" Ereignisprotokolle downloaden ","url":"13251.htm","node":"3+18+2+21+4","leaf":true},{"id":682,"o":173436,"text":" Herunterladen mehrerer Diagnoseinformationselemente ","url":"173436.htm","node":"3+18+2+21+5","leaf":true},{"id":683,"o":13254,"text":" Diagnose starten und die Ergebnisse herunterladen ","url":"13254.htm","node":"3+18+2+21+6","leaf":true},{"id":684,"o":13256,"text":" Starten, Beenden und Neustart von Programmen ","url":"13256.htm","node":"3+18+2+21+7","leaf":true}]},{"id":685,"o":158695,"text":" UEFI-SchutzgerÃ¤te ","url":"158695.htm","node":"3+18+2+22","leaf":true},{"id":686,"o":153888,"text":" Einstellungen eines verwalteten GerÃ¤ts ","url":"153888.htm","node":"3+18+2+23","leaf":true},{"id":687,"o":45856,"text":" Allgemeine Richtlinieneinstellungen ","url":"45856.htm","node":"3+18+2+24","leaf":true},{"id":688,"o":158030,"text":" Richtlinieneinstellungen des Administrationsagenten ","url":"158030.htm","node":"3+18+2+25","leaf":true}]},{"id":689,"o":89264,"text":" Benutzerkonten verwalten ","url":"89264.htm","node":"3+18+3","children":[{"id":690,"o":67895,"text":" Arbeiten mit Benutzerkonten ","url":"67895.htm","node":"3+18+3+0","leaf":true},{"id":691,"o":89265,"text":" Benutzerkonto fÃ¼r einen internen Benutzer hinzufÃ¼gen ","url":"89265.htm","node":"3+18+3+1","leaf":true},{"id":692,"o":175899,"text":" Benutzerkonto eines internen Benutzers bearbeiten ","url":"175899.htm","node":"3+18+3+2","leaf":true},{"id":693,"o":175900,"text":" Anzahl der zulÃ¤ssigen Eingabeversuche des Kennworts anpassen ","url":"175900.htm","node":"3+18+3+3","leaf":true},{"id":694,"o":123309,"text":" PrÃ¼fung der Eindeutigkeit des Namens des internen Benutzers anpassen ","url":"123309.htm","node":"3+18+3+4","leaf":true},{"id":695,"o":98408,"text":" Sicherheitsgruppen hinzufÃ¼gen ","url":"98408.htm","node":"3+18+3+5","leaf":true},{"id":696,"o":98446,"text":" Benutzer zur Gruppe hinzufÃ¼gen ","url":"98446.htm","node":"3+18+3+6","leaf":true},{"id":697,"o":89266,"text":" Zugriffsrechte auf Anwendungsfunktionen konfigurieren. Rollenbasierte Zugriffskontrolle ","url":"89266.htm","node":"3+18+3+7","children":[{"id":698,"o":201621,"text":" Zugriffsrechte auf Programmfunktionen ","url":"201621.htm","node":"3+18+3+7+0","leaf":true},{"id":699,"o":173787,"text":" Vorkonfigurierte Benutzerrollen ","url":"173787.htm","node":"3+18+3+7+1","leaf":true},{"id":700,"o":89268,"text":" Benutzerrollen hinzufÃ¼gen ","url":"89268.htm","node":"3+18+3+7+2","leaf":true},{"id":701,"o":89269,"text":" Einem Benutzer oder einer Sicherheitsgruppe eine Rolle zuweisen ","url":"89269.htm","node":"3+18+3+7+3","leaf":true},{"id":702,"o":172173,"text":" Zuweisen von Berechtigungen an Benutzer und Gruppen ","url":"172173.htm","node":"3+18+3+7+4","leaf":true},{"id":703,"o":173211,"text":" Ausdehnen von Benutzerrollen auf sekundÃ¤re Administrationsserver ","url":"173211.htm","node":"3+18+3+7+5","leaf":true}]},{"id":704,"o":98856,"text":" Benutzer zum GerÃ¤tebesitzer bestimmen ","url":"98856.htm","node":"3+18+3+8","leaf":true},{"id":705,"o":89271,"text":" Nachrichten an die Benutzer versenden ","url":"89271.htm","node":"3+18+3+9","leaf":true},{"id":706,"o":89273,"text":" Liste der mobilen GerÃ¤te des Benutzers anzeigen ","url":"89273.htm","node":"3+18+3+10","leaf":true},{"id":707,"o":89274,"text":" Benutzerzertifikat installieren ","url":"89274.htm","node":"3+18+3+11","leaf":true},{"id":708,"o":89275,"text":" Liste der fÃ¼r den Benutzer ausgestellten Zertifikate ","url":"89275.htm","node":"3+18+3+12","leaf":true},{"id":709,"o":45927,"text":" Ãœber den Administrator des virtuellen Administrationsservers ","url":"45927.htm","node":"3+18+3+13","leaf":true}]},{"id":710,"o":62008,"text":" Remote-Installation von Betriebssystemen und Programmen ","url":"62008.htm","node":"3+18+4","children":[{"id":711,"o":62011,"text":" Betriebssystem-Abbilder erstellen ","url":"62011.htm","node":"3+18+4+0","leaf":true},{"id":712,"o":92247,"text":" Betriebssystem-Images installieren ","url":"92247.htm","node":"3+18+4+1","leaf":true},{"id":713,"o":220653,"text":" Adresse von KSN-Proxyserver anpassen ","url":"220653.htm","node":"3+18+4+2","leaf":true},{"id":714,"o":66300,"text":" Treiber fÃ¼r die Windows-Vorinstallationsumgebung (WinPE) hinzufÃ¼gen ","url":"66300.htm","node":"3+18+4+3","leaf":true},{"id":715,"o":66296,"text":" Treiber zum Installationspaket mit dem Betriebssystem-Abbild hinzufÃ¼gen ","url":"66296.htm","node":"3+18+4+4","leaf":true},{"id":716,"o":66318,"text":" Einstellungen des Tools sysprep.exe anpassen ","url":"66318.htm","node":"3+18+4+5","leaf":true},{"id":717,"o":62143,"text":" Bereitstellung von Betriebssystemen auf neuen NetzwerkgerÃ¤ten ","url":"62143.htm","node":"3+18+4+6","leaf":true},{"id":718,"o":62009,"text":" Bereitstellung von Betriebssystemen auf Client-GerÃ¤ten ","url":"62009.htm","node":"3+18+4+7","leaf":true},{"id":719,"o":62012,"text":" Installationspakete fÃ¼r Programme erstellen ","url":"62012.htm","node":"3+18+4+8","leaf":true},{"id":720,"o":98718,"text":" Ausgabe eines Zertifikats fÃ¼r Installationspakete von Programmen ","url":"98718.htm","node":"3+18+4+9","leaf":true},{"id":721,"o":62010,"text":" Programme auf Client-GerÃ¤ten installieren ","url":"62010.htm","node":"3+18+4+10","leaf":true}]},{"id":722,"o":145580,"text":" Umgang mit Objekt-Revisionen ","url":"145580.htm","node":"3+18+5","children":[{"id":723,"o":146998,"text":" Ãœber Objekt-Revisionen ","url":"146998.htm","node":"3+18+5+0","leaf":true},{"id":724,"o":145583,"text":" Anzeigen des Abschnitts &amp;quot;Revisionsverlauf&amp;quot; ","url":"145583.htm","node":"3+18+5+1","leaf":true},{"id":725,"o":145582,"text":" Vergleich der Revisionen des Objekts ","url":"145582.htm","node":"3+18+5+2","leaf":true},{"id":726,"o":171898,"text":" Einrichten der Speicherdauer fÃ¼r Revision des Objekts und fÃ¼r Information Ã¼ber gelÃ¶schte Objekte ","url":"171898.htm","node":"3+18+5+3","leaf":true},{"id":727,"o":145571,"text":" Anzeigen der Revision des Objekts ","url":"145571.htm","node":"3+18+5+4","leaf":true},{"id":728,"o":145581,"text":" Speichern der Revision des Objektes in einer Datei ","url":"145581.htm","node":"3+18+5+5","leaf":true},{"id":729,"o":145598,"text":" Rollback der Ã„nderungen ","url":"145598.htm","node":"3+18+5+6","leaf":true},{"id":730,"o":147001,"text":" HinzufÃ¼gen einer Beschreibung der Revision ","url":"147001.htm","node":"3+18+5+7","leaf":true}]},{"id":731,"o":171696,"text":" Objekte lÃ¶schen ","url":"171696.htm","node":"3+18+6","children":[{"id":732,"o":171722,"text":" LÃ¶schen eines Objekts ","url":"171722.htm","node":"3+18+6+0","leaf":true},{"id":733,"o":171690,"text":" Anzeigen von Informationen Ã¼ber gelÃ¶schte Objekte ","url":"171690.htm","node":"3+18+6+1","leaf":true},{"id":734,"o":171720,"text":" Dauerhaftes LÃ¶schen von Objekten aus der Liste der gelÃ¶schten Objekte ","url":"171720.htm","node":"3+18+6+2","leaf":true}]},{"id":735,"o":64778,"text":" Verwaltung mobiler GerÃ¤te ","url":"64778.htm","node":"3+18+7","children":[{"id":736,"o":179492,"text":" Szenario: Bereitstellung der Funktion &amp;quot;Verwaltung mobiler GerÃ¤te&amp;quot; ","url":"179492.htm","node":"3+18+7+0","leaf":true},{"id":737,"o":89392,"text":" Gruppenrichtlinie fÃ¼r die Verwaltung von iOSÂ&nbsp;MDM-GerÃ¤ten ","url":"89392.htm","node":"3+18+7+1","leaf":true},{"id":738,"o":148239,"text":" Aktivieren der Funktion &amp;quot;Verwaltung mobiler GerÃ¤te&amp;quot; ","url":"148239.htm","node":"3+18+7+2","leaf":true},{"id":739,"o":148253,"text":" Einstellungen der Komponente &amp;quot;Verwaltung mobiler GerÃ¤te&amp;quot; anpassen ","url":"148253.htm","node":"3+18+7+3","leaf":true},{"id":740,"o":148249,"text":" Komponente &amp;quot;Verwaltung mobiler GerÃ¤te&amp;quot; deaktivieren ","url":"148249.htm","node":"3+18+7+4","leaf":true},{"id":741,"o":89281,"text":" Arbeiten mit Befehlen fÃ¼r mobile GerÃ¤te ","url":"89281.htm","node":"3+18+7+5","children":[{"id":742,"o":90314,"text":" Befehle zur Verwaltung mobiler GerÃ¤te ","url":"90314.htm","node":"3+18+7+5+0","leaf":true},{"id":743,"o":92205,"text":" Verwendung von FirebaseÂ&nbsp;CloudÂ&nbsp;Messaging ","url":"92205.htm","node":"3+18+7+5+1","leaf":true},{"id":744,"o":89282,"text":" Befehle absenden ","url":"89282.htm","node":"3+18+7+5+2","leaf":true},{"id":745,"o":89283,"text":" Status von Befehlen im Befehlsprotokoll anzeigen ","url":"89283.htm","node":"3+18+7+5+3","leaf":true}]},{"id":746,"o":89284,"text":" Zertifikate fÃ¼r mobile GerÃ¤te verwenden ","url":"89284.htm","node":"3+18+7+6","children":[{"id":747,"o":89285,"text":" Starten des Assistenten fÃ¼r die Installation eines Zertifikats ","url":"89285.htm","node":"3+18+7+6+0","leaf":true},{"id":748,"o":159864,"text":" Schritt 1. AuswÃ¤hlen des Zertifikattyps ","url":"159864.htm","node":"3+18+7+6+1","leaf":true},{"id":749,"o":159865,"text":" Schritt 2. AuswÃ¤hlen des GerÃ¤tetyps ","url":"159865.htm","node":"3+18+7+6+2","leaf":true},{"id":750,"o":159866,"text":" Schritt 3. AuswÃ¤hlen eines Benutzers ","url":"159866.htm","node":"3+18+7+6+3","leaf":true},{"id":751,"o":159868,"text":" Schritt 4. AuswÃ¤hlen der Zertifikatquelle ","url":"159868.htm","node":"3+18+7+6+4","leaf":true},{"id":752,"o":159870,"text":" Schritt 5. Zuweisen eines Tags zum Zertifikat ","url":"159870.htm","node":"3+18+7+6+5","leaf":true},{"id":753,"o":173671,"text":" Schritt 6. Angeben der VerÃ¶ffentlichungseinstellungen des Zertifikats ","url":"173671.htm","node":"3+18+7+6+6","leaf":true},{"id":754,"o":159869,"text":" Schritt 7. AuswÃ¤hlen der Methode zur Benachrichtigung von Benutzers ","url":"159869.htm","node":"3+18+7+6+7","leaf":true},{"id":755,"o":180806,"text":" Schritt 8. Generieren des Zertifikats ","url":"180806.htm","node":"3+18+7+6+8","leaf":true},{"id":756,"o":89286,"text":" Regeln fÃ¼r das Ausstellen von Zertifikaten anpassen ","url":"89286.htm","node":"3+18+7+6+9","leaf":true},{"id":757,"o":89287,"text":" Integration mit Public Key Infrastructure ","url":"89287.htm","node":"3+18+7+6+10","leaf":true},{"id":758,"o":89288,"text":" UnterstÃ¼tzung von Kerberos Constrained Delegation aktivieren ","url":"89288.htm","node":"3+18+7+6+11","leaf":true}]},{"id":759,"o":99423,"text":" Mobiles iOS-GerÃ¤t zur Liste der verwalteten GerÃ¤te hinzufÃ¼gen ","url":"99423.htm","node":"3+18+7+7","leaf":true},{"id":760,"o":188458,"text":" Mobiles Android-GerÃ¤t zur Liste der verwalteten GerÃ¤te hinzufÃ¼gen ","url":"188458.htm","node":"3+18+7+8","leaf":true},{"id":761,"o":64780,"text":" iOS MDM-GerÃ¤te verwalten ","url":"64780.htm","node":"3+18+7+9","children":[{"id":762,"o":100168,"text":" Ein iOS MDM-Profil mittels Zertifikat signieren ","url":"100168.htm","node":"3+18+7+9+0","leaf":true},{"id":763,"o":89292,"text":" Konfigurationsprofil hinzufÃ¼gen ","url":"89292.htm","node":"3+18+7+9+1","leaf":true},{"id":764,"o":89293,"text":" Konfigurationsprofil auf dem GerÃ¤t hinzufÃ¼gen ","url":"89293.htm","node":"3+18+7+9+2","leaf":true},{"id":765,"o":89296,"text":" Konfigurationsprofil vom GerÃ¤t lÃ¶schen ","url":"89296.htm","node":"3+18+7+9+3","leaf":true},{"id":766,"o":92554,"text":" HinzufÃ¼gen eines neuen GerÃ¤ts mittels der VerÃ¶ffentlichung eines Links auf das Profil ","url":"92554.htm","node":"3+18+7+9+4","leaf":true},{"id":767,"o":92555,"text":" HinzufÃ¼gen eines neuen GerÃ¤ts mittels der Installation des Profils durch den Administrator ","url":"92555.htm","node":"3+18+7+9+5","leaf":true},{"id":768,"o":89294,"text":" Provisioning-Profil hinzufÃ¼gen ","url":"89294.htm","node":"3+18+7+9+6","leaf":true},{"id":769,"o":89295,"text":" Provisioning-Profil auf dem GerÃ¤t installieren ","url":"89295.htm","node":"3+18+7+9+7","leaf":true},{"id":770,"o":89297,"text":" Provisioning-Profil vom GerÃ¤t lÃ¶schen ","url":"89297.htm","node":"3+18+7+9+8","leaf":true},{"id":771,"o":65163,"text":" Verwaltete Apps hinzufÃ¼gen ","url":"65163.htm","node":"3+18+7+9+9","leaf":true},{"id":772,"o":90688,"text":" App auf dem mobilen GerÃ¤t installieren ","url":"90688.htm","node":"3+18+7+9+10","leaf":true},{"id":773,"o":90835,"text":" App vom GerÃ¤t lÃ¶schen ","url":"90835.htm","node":"3+18+7+9+11","leaf":true},{"id":774,"o":158212,"text":" Roaming-Einstellungen auf einem mobilen iOS MDM-GerÃ¤t konfigurieren ","url":"158212.htm","node":"3+18+7+9+12","leaf":true},{"id":775,"o":90816,"text":" Informationen Ã¼ber das iOSÂ&nbsp;MDM-GerÃ¤t anzeigen ","url":"90816.htm","node":"3+18+7+9+13","leaf":true},{"id":776,"o":90605,"text":" Ausschluss eines iOSÂ&nbsp;MDM-GerÃ¤ts von der Verwaltung ","url":"90605.htm","node":"3+18+7+9+14","leaf":true},{"id":777,"o":92556,"text":" Senden von Befehlen an ein GerÃ¤t ","url":"92556.htm","node":"3+18+7+9+15","leaf":true},{"id":778,"o":92557,"text":" Untersuchung des AusfÃ¼hrungsstatus der gesendeten Befehle ","url":"92557.htm","node":"3+18+7+9+16","leaf":true}]},{"id":779,"o":90824,"text":" KES-GerÃ¤te verwalten ","url":"90824.htm","node":"3+18+7+10","children":[{"id":780,"o":90737,"text":" Paket mit mobilen Anwendungen fÃ¼r KES-GerÃ¤te erstellen ","url":"90737.htm","node":"3+18+7+10+0","leaf":true},{"id":781,"o":112804,"text":" Zertifikatbasierte Authentifizierung von KES-GerÃ¤ten aktivieren ","url":"112804.htm","node":"3+18+7+10+1","leaf":true},{"id":782,"o":91145,"text":" Informationen Ã¼ber das KES-GerÃ¤t anzeigen ","url":"91145.htm","node":"3+18+7+10+2","leaf":true},{"id":783,"o":91146,"text":" Ein KES-GerÃ¤t von der Verwaltung ausschlieÃŸen ","url":"91146.htm","node":"3+18+7+10+3","leaf":true}]}]},{"id":784,"o":64400,"text":" VerschlÃ¼sselung und Datenschutz ","url":"64400.htm","node":"3+18+8","children":[{"id":785,"o":64402,"text":" Liste der verschlÃ¼sselten GerÃ¤te anzeigen ","url":"64402.htm","node":"3+18+8+0","leaf":true},{"id":786,"o":64416,"text":" Liste der VerschlÃ¼sselungsereignisse anzeigen ","url":"64416.htm","node":"3+18+8+1","leaf":true},{"id":787,"o":65154,"text":" Liste der VerschlÃ¼sselungsereignisse in eine Textdatei exportieren ","url":"65154.htm","node":"3+18+8+2","leaf":true},{"id":788,"o":64418,"text":" VerschlÃ¼sselungsberichte erstellen und anzeigen ","url":"64418.htm","node":"3+18+8+3","leaf":true},{"id":789,"o":193047,"text":" Ãœbertragung von ChiffrierschlÃ¼sseln zwischen Administrationsservern ","url":"193047.htm","node":"3+18+8+4","leaf":true}]},{"id":790,"o":46876,"text":" Datenverwaltung ","url":"46876.htm","node":"3+18+9","children":[{"id":791,"o":52373,"text":" Liste mit Objekten, die sich in der Datenverwaltung befinden, in eine Textdatei exportieren ","url":"52373.htm","node":"3+18+9+0","leaf":true},{"id":792,"o":4535,"text":" Installationspakete ","url":"4535.htm","node":"3+18+9+1","leaf":true},{"id":793,"o":158852,"text":" Grundlegende Statusvarianten der Dateien in der Datenverwaltung ","url":"158852.htm","node":"3+18+9+2","leaf":true},{"id":794,"o":172869,"text":" AuslÃ¶sen von Regeln im Smart Training-Modus ","url":"172869.htm","node":"3+18+9+3","children":[{"id":795,"o":172650,"text":" Liste der Funde anzeigen, die auf Regeln der Adaptiven Kontrolle von Anomalien beruhen ","url":"172650.htm","node":"3+18+9+3+0","leaf":true},{"id":796,"o":173182,"text":" AusschlÃ¼sse aus den Regeln zur Adaptiven Kontrolle von Anomalien hinzufÃ¼gen ","url":"173182.htm","node":"3+18+9+3+1","children":[{"id":797,"o":173183,"text":" Schritt 1. AuswÃ¤hlen des Programms ","url":"173183.htm","node":"3+18+9+3+1+0","leaf":true},{"id":798,"o":173184,"text":" Schritt 2. AuswÃ¤hlen der Richtlinie (Richtlinien) ","url":"173184.htm","node":"3+18+9+3+1+1","leaf":true},{"id":799,"o":173198,"text":" Schritt 3. Verarbeiten der Richtlinie (Richtlinien) ","url":"173198.htm","node":"3+18+9+3+1+2","leaf":true}]}]},{"id":800,"o":12429,"text":" QuarantÃ¤ne und Backup ","url":"12429.htm","node":"3+18+9+4","children":[{"id":801,"o":52347,"text":" Aktivieren der Remote-Verwaltung von Dateien in der Datenverwaltung ","url":"52347.htm","node":"3+18+9+4+0","leaf":true},{"id":802,"o":12430,"text":" Eigenschaften der Datei in der Datenverwaltung anzeigen ","url":"12430.htm","node":"3+18+9+4+1","leaf":true},{"id":803,"o":12431,"text":" Dateien aus der Datenverwaltung entfernen ","url":"12431.htm","node":"3+18+9+4+2","leaf":true},{"id":804,"o":12432,"text":" Dateien aus der Datenverwaltung wiederherstellen ","url":"12432.htm","node":"3+18+9+4+3","leaf":true},{"id":805,"o":12592,"text":" Datei aus der Datenverwaltung auf der Festplatte speichern ","url":"12592.htm","node":"3+18+9+4+4","leaf":true},{"id":806,"o":3627,"text":" Untersuchung der Dateien in QuarantÃ¤ne ","url":"3627.htm","node":"3+18+9+4+5","leaf":true}]},{"id":807,"o":3666,"text":" Aktive Bedrohungen ","url":"3666.htm","node":"3+18+9+5","children":[{"id":808,"o":12607,"text":" Unverarbeitete Dateien desinfizieren ","url":"12607.htm","node":"3+18+9+5+0","leaf":true},{"id":809,"o":12594,"text":" Datei mit verschobener Verarbeitung auf Festplatte speichern ","url":"12594.htm","node":"3+18+9+5+1","leaf":true},{"id":810,"o":12606,"text":" Datei aus dem Ordner &amp;quot;Aktive Bedrohungen&amp;quot; lÃ¶schen ","url":"12606.htm","node":"3+18+9+5+2","leaf":true}]}]},{"id":811,"o":89310,"text":" KasperskyÂ&nbsp;SecurityÂ&nbsp;Network (KSN) ","url":"89310.htm","node":"3+18+10","children":[{"id":812,"o":89311,"text":" Ãœber KSN ","url":"89311.htm","node":"3+18+10+0","leaf":true},{"id":813,"o":89312,"text":" Zugriff auf Kaspersky Security Network vorbereiten ","url":"89312.htm","node":"3+18+10+1","leaf":true},{"id":814,"o":90926,"text":" KSN aktivieren und deaktivieren ","url":"90926.htm","node":"3+18+10+2","leaf":true},{"id":815,"o":212978,"text":" Die akzeptierte KSN-ErklÃ¤rung anzeigen ","url":"212978.htm","node":"3+18+10+3","leaf":true},{"id":816,"o":89313,"text":" KSN Proxyserver-Statistik anzeigen ","url":"89313.htm","node":"3+18+10+4","leaf":true},{"id":817,"o":213255,"text":" Eine aktualisierte KSN-ErklÃ¤rung akzeptieren ","url":"213255.htm","node":"3+18+10+5","leaf":true},{"id":818,"o":170659,"text":" ZusÃ¤tzlicher Schutz durch Verwendung von KasperskyÂ&nbsp;Security Network ","url":"74345.htm","node":"3+18+10+6","leaf":true},{"id":819,"o":178325,"text":" Feststellen, ob der Verteilungspunkt als KSN-Proxyserver fungiert ","url":"178325.htm","node":"3+18+10+7","leaf":true}]},{"id":820,"o":203924,"text":" Zwischen Online-Hilfe und Offline-Hilfe wechseln ","url":"203924.htm","node":"3+18+11","leaf":true}]},{"id":821,"o":151332,"text":" Ereignisse in SIEM-Systeme exportieren ","url":"151332.htm","node":"3+19","children":[{"id":822,"o":151328,"text":" Ereignisexport in SIEM-Systeme konfigurieren ","url":"151328.htm","node":"3+19+0","leaf":true},{"id":823,"o":151329,"text":" VorlÃ¤ufige Bedingungen ","url":"151329.htm","node":"3+19+1","leaf":true},{"id":824,"o":151331,"text":" Ãœber Ereignisse in Kaspersky Security Center ","url":"151331.htm","node":"3+19+2","leaf":true},{"id":825,"o":151330,"text":" Ãœber den Ereignisexport ","url":"151330.htm","node":"3+19+3","leaf":true},{"id":826,"o":151335,"text":" Ãœber das Konfigurieren des Ereignisexports in ein SIEM-System ","url":"151335.htm","node":"3+19+4","leaf":true},{"id":827,"o":218223,"text":" Ereignisse zum Export in SIEM-Systeme im Syslog-Format markieren ","url":"218223.htm","node":"3+19+5","children":[{"id":828,"o":151326,"text":" Ereignisse von Kaspersky-Anwendungen fÃ¼r den Export im Syslog-Format markieren ","url":"151326.htm","node":"3+19+5+0","leaf":true},{"id":829,"o":151325,"text":" Allgemeine Ereignisse zum Export im Syslog-Format markieren ","url":"151325.htm","node":"3+19+5+1","leaf":true}]},{"id":830,"o":151333,"text":" Ãœber das Exportieren von Ereignissen im Syslog-Format ","url":"151333.htm","node":"3+19+6","leaf":true},{"id":831,"o":151345,"text":" Ãœber das Exportieren von Ereignissen mittels der Formate CEF und LEEF ","url":"151345.htm","node":"3+19+7","leaf":true},{"id":832,"o":89277,"text":" Konfiguration von Kaspersky Security Center fÃ¼r den Export an ein SIEM-System ","url":"89277.htm","node":"3+19+8","leaf":true},{"id":833,"o":151344,"text":" Ereignisse direkt aus der Datenbank exportieren ","url":"151344.htm","node":"3+19+9","children":[{"id":834,"o":151343,"text":" Eine SQL-Abfrage mit dem Tool &amp;quot;klsql2&amp;quot; ausfÃ¼hren ","url":"151343.htm","node":"3+19+9+0","leaf":true},{"id":835,"o":151338,"text":" Beispielhafte SQL-Abfrage, die mit dem Tool &amp;quot;klsql2&amp;quot; erstellt wurde ","url":"151338.htm","node":"3+19+9+1","leaf":true},{"id":836,"o":151339,"text":" Anzeige des Namens der Datenbank von Kaspersky Security Center ","url":"151339.htm","node":"3+19+9+2","leaf":true}]},{"id":837,"o":151340,"text":" Exportergebnisse anzeigen ","url":"151340.htm","node":"3+19+10","leaf":true}]},{"id":838,"o":207516,"text":" Verwenden von SNMP zum Senden von Statistiken an Programme von Drittanbietern ","url":"207516.htm","node":"3+20","children":[{"id":839,"o":263978,"text":" Den SNMP-Dienst fÃ¼r die Verwendung mit KasperskyÂ&nbsp;SecurityÂ&nbsp;Center konfigurieren ","url":"263978.htm","node":"3+20+0","leaf":true},{"id":840,"o":207517,"text":" Kennungen des SNMP-Agenten und der SNMP-Objekte ","url":"207517.htm","node":"3+20+1","leaf":true},{"id":841,"o":209705,"text":" Den Namen des ZeichenfolgenzÃ¤hlers aus einer Objektkennung ableiten ","url":"209705.htm","node":"3+20+2","leaf":true},{"id":842,"o":207518,"text":" Werte von Objektkennungen fÃ¼r SNMP ","url":"207518.htm","node":"3+20+3","leaf":true},{"id":843,"o":207955,"text":" ProblemlÃ¶sung ","url":"207955.htm","node":"3+20+4","leaf":true}]},{"id":844,"o":173521,"text":" Arbeiten in einer Cloud-Umgebung ","url":"173521.htm","node":"3+21","children":[{"id":845,"o":173541,"text":" Ãœber die Arbeit in der Cloud-Umgebung ","url":"173541.htm","node":"3+21+0","leaf":true},{"id":846,"o":177020,"text":" Szenario: Bereitstellung fÃ¼r eine Cloud-Umgebung ","url":"177020.htm","node":"3+21+1","leaf":true},{"id":847,"o":179139,"text":" Voraussetzungen fÃ¼r die Softwareverteilung von Kaspersky Security Center in einer Cloud-Umgebung ","url":"179139.htm","node":"3+21+2","leaf":true},{"id":848,"o":206419,"text":" Hardwarevoraussetzungen des Administrationsservers in einer Cloud-Umgebung ","url":"206419.htm","node":"3+21+3","leaf":true},{"id":849,"o":176966,"text":" Varianten der Lizenzierung in der Cloud-Umgebung ","url":"176966.htm","node":"3+21+4","leaf":true},{"id":850,"o":173512,"text":" Datenbankoptionen zum Arbeiten in einer Cloud-Umgebung ","url":"173512.htm","node":"3+21+5","leaf":true},{"id":851,"o":148750,"text":" Arbeit mit der Cloud-Umgebung Amazon Web Services ","url":"148750.htm","node":"3+21+6","children":[{"id":852,"o":150767,"text":" Ãœber die Arbeit in der Cloud-Umgebung Amazon Web Services ","url":"150767.htm","node":"3+21+6+0","leaf":true},{"id":853,"o":149566,"text":" Erstellen von IAM-Rollen und IAM-Benutzerkonten fÃ¼r Amazon EC2-Instances ","url":"149566.htm","node":"3+21+6+1","children":[{"id":854,"o":160141,"text":" Bereitstellung der Rechte fÃ¼r die Arbeit des Kaspersky Security Center Administrationsservers mit den AWS ","url":"160141.htm","node":"3+21+6+1+0","leaf":true},{"id":855,"o":160124,"text":" IAM-Rolle fÃ¼r Administrationsserver erstellen ","url":"160124.htm","node":"3+21+6+1+1","leaf":true},{"id":856,"o":149021,"text":" Erstellen eines IAM-Benutzerkontos fÃ¼r die Arbeit mit Kaspersky Security Center ","url":"149021.htm","node":"3+21+6+1+2","leaf":true},{"id":857,"o":158126,"text":" Erstellen der IAM-Rolle fÃ¼r die Installation von Programmen auf Amazon EC2-Instances ","url":"158126.htm","node":"3+21+6+1+3","leaf":true}]},{"id":858,"o":174408,"text":" Arbeiten mit Amazon RDS ","url":"174408.htm","node":"3+21+6+2","children":[{"id":859,"o":174031,"text":" Amazon RDS-Instance erstellen ","url":"174031.htm","node":"3+21+6+2+0","leaf":true},{"id":860,"o":174046,"text":" Optionsgruppe fÃ¼r eine Amazon RDS-Instance erstellen ","url":"174046.htm","node":"3+21+6+2+1","leaf":true},{"id":861,"o":174409,"text":" Ã„ndern der Optionsgruppe ","url":"174409.htm","node":"3+21+6+2+2","leaf":true},{"id":862,"o":174419,"text":" Ã„ndern der Berechtigungen fÃ¼r die IAM-Rolle der Amazon RDS-DB-Instance ","url":"174419.htm","node":"3+21+6+2+3","leaf":true},{"id":863,"o":173443,"text":" Amazon S3-Bucket fÃ¼r Datenbank vorbereiten ","url":"173443.htm","node":"3+21+6+2+4","leaf":true},{"id":864,"o":173801,"text":" Datenbank auf Amazon RDS migrieren ","url":"173801.htm","node":"3+21+6+2+5","leaf":true}]}]},{"id":865,"o":173508,"text":" Arbeiten mit der Cloud-Umgebung Microsoft Azure ","url":"173508.htm","node":"3+21+7","children":[{"id":866,"o":173515,"text":" Ãœber das Arbeiten in Microsoft Azure ","url":"173515.htm","node":"3+21+7+0","leaf":true},{"id":867,"o":173604,"text":" Erstellen eines Abonnements, einer Anwendungs-ID und eines Kennworts ","url":"173604.htm","node":"3+21+7+1","leaf":true},{"id":868,"o":176476,"text":" Der Azure Anwendungs-ID eine Rolle zuweisen ","url":"176476.htm","node":"3+21+7+2","leaf":true},{"id":869,"o":173488,"text":" Verteilen des Administrationsservers in Microsoft Azure und AuswÃ¤hlen der Datenbank ","url":"173488.htm","node":"3+21+7+3","leaf":true},{"id":870,"o":175727,"text":" Mit Azure SQL arbeiten ","url":"175727.htm","node":"3+21+7+4","children":[{"id":871,"o":175706,"text":" Azure-Speicherkonto erstellen ","url":"175706.htm","node":"3+21+7+4+0","leaf":true},{"id":872,"o":175728,"text":" Azure SQL-Datenbank und SQL Server erstellen ","url":"175728.htm","node":"3+21+7+4+1","leaf":true},{"id":873,"o":175622,"text":" Datenbank auf Azure SQL migrieren ","url":"175622.htm","node":"3+21+7+4+2","leaf":true}]}]},{"id":874,"o":193319,"text":" Arbeiten mit Google Cloud ","url":"193319.htm","node":"3+21+8","children":[{"id":875,"o":204070,"text":" Erstellen von Client-E-Mail, Projekt-ID und privatem SchlÃ¼ssel ","url":"204070.htm","node":"3+21+8+0","leaf":true},{"id":876,"o":204066,"text":" Arbeiten mit einer Instanz von Google Cloud SQL for MySQL ","url":"204066.htm","node":"3+21+8+1","leaf":true}]},{"id":877,"o":149517,"text":" Erforderliche Komponenten fÃ¼r Client-GerÃ¤te in einer Cloud-Umgebung fÃ¼r die Arbeit mit Kaspersky Security Center ","url":"149517.htm","node":"3+21+9","leaf":true},{"id":878,"o":213956,"text":" Erstellen von Installationspaketen, die zur Konfiguration der Cloud-Umgebung erforderlich sind ","url":"213956.htm","node":"3+21+10","leaf":true},{"id":879,"o":148304,"text":" Eine Cloud-Umgebung konfigurieren ","url":"148304.htm","node":"3+21+11","children":[{"id":880,"o":151539,"text":" Ãœber den Assistenten zur Konfiguration der Cloud-Umgebung ","url":"151539.htm","node":"3+21+11+0","leaf":true},{"id":881,"o":148963,"text":" Schritt 1. AuswÃ¤hlen der Methode zur Programmaktivierung ","url":"148963.htm","node":"3+21+11+1","leaf":true},{"id":882,"o":174199,"text":" Schritt 2. AuswÃ¤hlen der Cloud-Umgebung ","url":"174199.htm","node":"3+21+11+2","leaf":true},{"id":883,"o":148964,"text":" Schritt 3. Autorisieren in der Cloud-Umgebung ","url":"148964.htm","node":"3+21+11+3","leaf":true},{"id":884,"o":148966,"text":" Schritt 4. Konfigurieren der Cloud-Synchronisation und WÃ¤hlen weiterer MaÃŸnahmen ","url":"148966.htm","node":"3+21+11+4","leaf":true},{"id":885,"o":148967,"text":" Schritt 5. Konfigurieren von Kaspersky Security Network in der Cloud-Umgebung ","url":"148967.htm","node":"3+21+11+5","leaf":true},{"id":886,"o":149740,"text":" Schritt 6. Konfigurieren von E-Mail-Benachrichtigungen in der Cloud-Umgebung ","url":"149740.htm","node":"3+21+11+6","leaf":true},{"id":887,"o":148986,"text":" Schritt 7. Erstellen einer Erstkonfiguration des Schutzes fÃ¼r die Cloud-Umgebung ","url":"148986.htm","node":"3+21+11+7","leaf":true},{"id":888,"o":154319,"text":" Schritt 8. AuswÃ¤hlen der auszufÃ¼hrenden MaÃŸnahme, wenn das Betriebssystem wÃ¤hrend der Installation einen Neustart erfordert (fÃ¼r Cloud-Umgebung) ","url":"154319.htm","node":"3+21+11+8","leaf":true},{"id":889,"o":148990,"text":" Schritt 9. Empfangen von Updates durch den Administrationsserver ","url":"148990.htm","node":"3+21+11+9","leaf":true}]},{"id":890,"o":151905,"text":" ÃœberprÃ¼fen der Konfiguration ","url":"151905.htm","node":"3+21+12","leaf":true},{"id":891,"o":149113,"text":" Gruppe der Cloud-GerÃ¤te ","url":"149113.htm","node":"3+21+13","leaf":true},{"id":892,"o":149025,"text":" Abfrage des Netzwerksegments ","url":"149025.htm","node":"3+21+14","children":[{"id":893,"o":150361,"text":" HinzufÃ¼gen von Verbindungen fÃ¼r die Abfrage von Cloud-Segmenten ","url":"150361.htm","node":"3+21+14+0","leaf":true},{"id":894,"o":150362,"text":" Entfernen von Verbindungen fÃ¼r die Abfrage von Cloud-Segmenten ","url":"150362.htm","node":"3+21+14+1","leaf":true},{"id":895,"o":150352,"text":" Abfragezeitplan anpassen ","url":"150352.htm","node":"3+21+14+2","leaf":true}]},{"id":896,"o":148800,"text":" Installation von Programmen auf GerÃ¤ten in einer Cloud-Umgebung ","url":"148800.htm","node":"3+21+15","leaf":true},{"id":897,"o":148875,"text":" Eigenschaften von Cloud-GerÃ¤ten anzeigen ","url":"148875.htm","node":"3+21+16","leaf":true},{"id":898,"o":148815,"text":" Synchronisierung mit der Cloud ","url":"148815.htm","node":"3+21+17","leaf":true},{"id":899,"o":202904,"text":" Verwendung von Bereitstellungsskripten fÃ¼r die Verteilung von Sicherheitsanwendungen ","url":"202904.htm","node":"3+21+18","leaf":true},{"id":900,"o":204251,"text":" Bereitstellung von Kaspersky Security Center in Yandex.Cloud ","url":"204251.htm","node":"3+21+19","leaf":true}]},{"id":901,"o":153796,"text":" Appendix ","url":"153796.htm","node":"3+22","children":[{"id":902,"o":46989,"text":" Zusatzoptionen ","url":"46989.htm","node":"3+22+0","children":[{"id":903,"o":13352,"text":" Automatisierung der Programmfunktion von KasperskyÂ&nbsp;SecurityÂ&nbsp;Center. Tool klakaut ","url":"13352.htm","node":"3+22+0+0","leaf":true},{"id":904,"o":55366,"text":" Arbeiten mit externen Instrumenten ","url":"55366.htm","node":"3+22+0+1","leaf":true},{"id":905,"o":115004,"text":" Modus des Administrationsagenten zum Klonen von Laufwerken ","url":"115004.htm","node":"3+22+0+2","leaf":true},{"id":906,"o":192663,"text":" Vorbereiten eines ReferenzgerÃ¤ts mit installiertem Administrationsagenten, um ein Betriebssystemabbild zu erstellen ","url":"192663.htm","node":"3+22+0+3","leaf":true},{"id":907,"o":150772,"text":" Einstellungen des Empfangs von Nachrichten von der Komponente &amp;quot;Ãœberwachung der DateiintegritÃ¤t&amp;quot; anpassen ","url":"150772.htm","node":"3+22+0+4","leaf":true},{"id":908,"o":100999,"text":" Wartung des Administrationsservers ","url":"100999.htm","node":"3+22+0+5","leaf":true},{"id":909,"o":242745,"text":" Zugriff auf Ã¶ffentliche DNS-Server ","url":"242745.htm","node":"3+22+0+6","leaf":true},{"id":910,"o":128642,"text":" Fenster &amp;quot;Benachrichtigungsmethode&amp;quot; ","url":"128642.htm","node":"3+22+0+7","leaf":true},{"id":911,"o":170082,"text":" Fenster GerÃ¤teauswahl ","url":"54289.htm","node":"3+22+0+8","leaf":true},{"id":912,"o":158770,"text":" Fenster &amp;quot;Name des zu erstellenden Objekts festlegen&amp;quot; ","url":"158770.htm","node":"3+22+0+9","leaf":true},{"id":913,"o":170506,"text":" Abschnitt Programmkategorien ","url":"130776.htm","node":"3+22+0+10","leaf":true}]},{"id":914,"o":46987,"text":" Besonderheiten der VerwaltungsoberflÃ¤che ","url":"46987.htm","node":"3+22+1","children":[{"id":915,"o":3336,"text":" Konsolenstruktur ","url":"3336.htm","node":"3+22+1+0","leaf":true},{"id":916,"o":11466,"text":" Wie Daten im Arbeitsbereich aktualisiert werden ","url":"11466.htm","node":"3+22+1+1","leaf":true},{"id":917,"o":11469,"text":" Wie in der Konsolenstruktur navigiert wird ","url":"11469.htm","node":"3+22+1+2","leaf":true},{"id":918,"o":11470,"text":" Wie das Eigenschaftenfenster eines Objekts im Arbeitsbereich geÃ¶ffnet wird ","url":"11470.htm","node":"3+22+1+3","leaf":true},{"id":919,"o":11471,"text":" Wie eine Gruppe von Objekten im Arbeitsbereich ausgewÃ¤hlt wird ","url":"11471.htm","node":"3+22+1+4","leaf":true},{"id":920,"o":11472,"text":" Wie die Auswahl von Spalten im Arbeitsbereich geÃ¤ndert wird ","url":"11472.htm","node":"3+22+1+5","leaf":true}]},{"id":921,"o":46988,"text":" Hilfe ","url":"46988.htm","node":"3+22+2","children":[{"id":922,"o":11343,"text":" Befehle des KontextmenÃ¼s ","url":"11343.htm","node":"3+22+2+0","leaf":true},{"id":923,"o":82113,"text":" Liste der verwalteten GerÃ¤te. Beschreibung von Spalten ","url":"82113.htm","node":"3+22+2+1","leaf":true},{"id":924,"o":3966,"text":" Statusmeldungen der GerÃ¤te, Aufgaben und Richtlinien ","url":"3966.htm","node":"3+22+2+2","leaf":true},{"id":925,"o":131543,"text":" Symbole der Status der Dateien in der Verwaltungskonsole ","url":"131543.htm","node":"3+22+2+3","leaf":true}]},{"id":926,"o":153794,"text":" Suche und Export von Daten ","url":"153794.htm","node":"3+22+3","children":[{"id":927,"o":3645,"text":" Suche nach GerÃ¤ten ","url":"3645.htm","node":"3+22+3+0","leaf":true},{"id":928,"o":150373,"text":" Suchoptionen fÃ¼r GerÃ¤te ","url":"150373.htm","node":"3+22+3+1","leaf":true},{"id":929,"o":56598,"text":" Masken in Zeichenfolgenvariablen verwenden ","url":"56598.htm","node":"3+22+3+2","leaf":true},{"id":930,"o":113025,"text":" RegulÃ¤re AusdrÃ¼cke in der Suchzeile verwenden ","url":"113025.htm","node":"3+22+3+3","leaf":true},{"id":931,"o":59722,"text":" Listen aus Dialogfenstern exportieren ","url":"59722.htm","node":"3+22+3+4","leaf":true}]},{"id":932,"o":173043,"text":" Einstellungen fÃ¼r Aufgaben ","url":"173043.htm","node":"3+22+4","children":[{"id":933,"o":173072,"text":" Allgemeine Aufgabeneinstellungen ","url":"173072.htm","node":"3+22+4+0","leaf":true},{"id":934,"o":172077,"text":" Einstellungen der Aufgabe zum Download von Updates in die Datenverwaltung des Administrationsservers ","url":"172077.htm","node":"3+22+4+1","leaf":true},{"id":935,"o":172117,"text":" Einstellungen der Aufgabe zum Download von Updates in die Datenverwaltung der Verteilungspunkte ","url":"172117.htm","node":"3+22+4+2","leaf":true},{"id":936,"o":172011,"text":" Einstellungen der Aufgabe zur Suche nach Schwachstellen und erforderlichen Updates ","url":"172011.htm","node":"3+22+4+3","leaf":true},{"id":937,"o":172841,"text":" Erforderliche Updates installieren und Schwachstellen schlieÃŸen ","url":"172841.htm","node":"3+22+4+4","leaf":true}]},{"id":938,"o":171908,"text":" Globale Liste der Subnetze ","url":"171908.htm","node":"3+22+5","children":[{"id":939,"o":171910,"text":" HinzufÃ¼gen von Subnetzen zur globalen Liste der Subnetze ","url":"171910.htm","node":"3+22+5+0","leaf":true},{"id":940,"o":171924,"text":" Anzeigen und Ã„ndern von Subnetzeigenschaften in der globalen Liste der Subnetze ","url":"171924.htm","node":"3+22+5+1","leaf":true}]},{"id":941,"o":172012,"text":" Verwendung des Administrationsagenten fÃ¼r Windows, macOS und Linux: Vergleich ","url":"172012.htm","node":"3+22+6","leaf":true}]}]},{"id":942,"o":166361,"text":" Kaspersky Security Center Web Console ","url":"166361.htm","node":"4","children":[{"id":943,"o":166137,"text":" Bereitstellungsdiagramm fÃ¼r Kaspersky Security Center Administrationsserver und Kaspersky Security Center Web Console ","url":"166137.htm","node":"4+0","leaf":true},{"id":944,"o":199308,"text":" Von Kaspersky Security Center Web Console verwendete Ports ","url":"199308.htm","node":"4+1","leaf":true},{"id":945,"o":296463,"text":" BenutzeroberflÃ¤che der Kaspersky Security Center Web Console ","url":"247197.htm","node":"4+2","leaf":true},{"id":946,"o":272710,"text":" Abschnitte des HauptmenÃ¼s anheften und lÃ¶sen ","url":"272710.htm","node":"4+3","leaf":true},{"id":947,"o":166156,"text":" Szenario: Installation und Erstkonfiguration von Kaspersky Security Center Web Console ","url":"166156.htm","node":"4+4","leaf":true},{"id":948,"o":176383,"text":" Installation ","url":"176383.htm","node":"4+5","children":[{"id":949,"o":166764,"text":" KasperskyÂ&nbsp;SecurityÂ&nbsp;Center installieren (Standardinstallation) ","url":"166764.htm","node":"4+5+0","leaf":true},{"id":950,"o":166765,"text":" Kaspersky Security Center Web Console installieren ","url":"166765.htm","node":"4+5+1","leaf":true},{"id":951,"o":234942,"text":" Installation der Kaspersky Security Center Web Console mit Verbindung zum Administrationsserver, der auf Knoten des Failover-Clusters installiert wurde ","url":"234942.htm","node":"4+5+2","leaf":true},{"id":952,"o":203901,"text":" Kaspersky Security Center Web Console aktualisieren ","url":"203901.htm","node":"4+5+3","leaf":true},{"id":953,"o":232138,"text":" Zertifikate fÃ¼r die AusfÃ¼hrung mit Kaspersky Security Center Web Console ","url":"232138.htm","node":"4+5+4","children":[{"id":954,"o":203355,"text":" Zertifikat fÃ¼r Kaspersky Security Center Web Console neu ausstellen ","url":"203355.htm","node":"4+5+4+0","leaf":true},{"id":955,"o":184363,"text":" Zertifikat fÃ¼r Kaspersky Security Center Web Console ersetzen ","url":"184363.htm","node":"4+5+4+1","leaf":true},{"id":956,"o":184402,"text":" Zertifikaten fÃ¼r vertrauenswÃ¼rdige Administrationsserver in der Kaspersky Security Center Web Console angeben ","url":"184402.htm","node":"4+5+4+2","leaf":true},{"id":957,"o":201428,"text":" Konvertieren eines pfx-Zertifikats in ein pem-Zertifikat ","url":"201428.htm","node":"4+5+4+3","leaf":true}]}]},{"id":958,"o":242992,"text":" Migration von KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;Windows ","url":"242992.htm","node":"4+6","children":[{"id":959,"o":186799,"text":" Ãœber die Migration nach Kaspersky Security Center Cloud Console ","url":"186799.htm","node":"4+6+0","leaf":true},{"id":960,"o":242964,"text":" Ãœber die Migration zu Kaspersky Security Center Linux ","url":"242964.htm","node":"4+6+1","leaf":true},{"id":961,"o":268713,"text":" Ãœber die Migration zu KasperskyÂ&nbsp;XDRÂ&nbsp;Expert ","url":"268713.htm","node":"4+6+2","leaf":true},{"id":962,"o":242161,"text":" Gruppenobjekte aus KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;Windows exportieren ","url":"242161.htm","node":"4+6+3","leaf":true},{"id":963,"o":248973,"text":" Importieren der Exportdatei in KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;Linux ","url":"248973.htm","node":"4+6+4","leaf":true},{"id":964,"o":244473,"text":" Verwaltete GerÃ¤te unter die Verwaltung von KasperskyÂ&nbsp;SecurityÂ&nbsp;CenterÂ&nbsp;Linux stellen ","url":"244473.htm","node":"4+6+5","leaf":true}]},{"id":965,"o":177033,"text":" In der KasperskyÂ&nbsp;SecurityÂ&nbsp;Center WebÂ&nbsp;Console anmelden und abmelden ","url":"177033.htm","node":"4+7","leaf":true},{"id":966,"o":221198,"text":" IdentitÃ¤ts- und Zugriffsverwaltung in Kaspersky Security Center Web Console ","url":"221198.htm","node":"4+8","children":[{"id":967,"o":221048,"text":" Ãœber die IdentitÃ¤ts- und Zugriffsverwaltung ","url":"221048.htm","node":"4+8+0","leaf":true},{"id":968,"o":221056,"text":" Aktivieren der IdentitÃ¤ts- uns Zugriffsverwaltung: Szenario ","url":"221056.htm","node":"4+8+1","leaf":true},{"id":969,"o":221200,"text":" Die IdentitÃ¤ts- und Zugriffsverwaltung in der Kaspersky Security Center Web Console konfigurieren ","url":"221200.htm","node":"4+8+2","leaf":true},{"id":970,"o":227155,"text":" Die Kaspersky Industrial CyberSecurity for Networks in der Kaspersky Security Center Web Console registrieren ","url":"227155.htm","node":"4+8+3","leaf":true},{"id":971,"o":221068,"text":" Token-Lebensdauer und Autorisierungs-Timeout der IdentitÃ¤ts- und Zugriffsverwaltung ","url":"221068.htm","node":"4+8+4","leaf":true},{"id":972,"o":221761,"text":" IAM-Zertifikate herunterladen und verteilen ","url":"221761.htm","node":"4+8+5","leaf":true},{"id":973,"o":221204,"text":" Die IdentitÃ¤ts- und Zugriffsverwaltung deaktivieren ","url":"221204.htm","node":"4+8+6","leaf":true}]},{"id":974,"o":210700,"text":" DomÃ¤nenauthentifizierung mithilfe der Protokolle NTLM und Kerberos konfigurieren ","url":"210700.htm","node":"4+9","leaf":true},{"id":975,"o":176384,"text":" Administrationsserver konfigurieren ","url":"176384.htm","node":"4+10","children":[{"id":976,"o":176084,"text":" Verbindung zwischen KasperskyÂ&nbsp;SecurityÂ&nbsp;Center WebÂ&nbsp;Console und Administrationsserver anpassen ","url":"176084.htm","node":"4+10+0","leaf":true},{"id":977,"o":176094,"text":" Protokollierung der Verbindungsereignisse des Administrationsservers konfigurieren ","url":"176094.htm","node":"4+10+1","leaf":true},{"id":978,"o":246922,"text":" Die Internetzugriffseinstellungen fÃ¼r den Administrationsserver konfigurieren ","url":"246922.htm","node":"4+10+2","leaf":true},{"id":979,"o":176098,"text":" Maximalen Anzahl an Ereignissen in der Ereignis-Datenverwaltung festlegen ","url":"176098.htm","node":"4+10+3","leaf":true},{"id":980,"o":176105,"text":" Verbindungseinstellungen des GerÃ¤ts mit Schutz auf UEFI-Ebene ","url":"176105.htm","node":"4+10+4","leaf":true},{"id":981,"o":178059,"text":" Hierarchie der Administrationsserver erstellen: einen sekundÃ¤ren Administrationsserver hinzufÃ¼gen ","url":"178059.htm","node":"4+10+5","leaf":true},{"id":982,"o":178565,"text":" Liste mit sekundÃ¤ren Administrationsservern anzeigen ","url":"178565.htm","node":"4+10+6","leaf":true},{"id":983,"o":180308,"text":" Administrationsserver-Hierarchie lÃ¶schen ","url":"180308.htm","node":"4+10+7","leaf":true},{"id":984,"o":233252,"text":" Wartung des Administrationsservers ","url":"233252.htm","node":"4+10+8","leaf":true},{"id":985,"o":195133,"text":" Schnittstelle konfigurieren ","url":"195133.htm","node":"4+10+9","leaf":true},{"id":986,"o":231121,"text":" Virtuelle Administrationsserver verwalten ","url":"231121.htm","node":"4+10+10","children":[{"id":987,"o":297418,"text":" Einen virtuellen Administrationsserver erstellen ","url":"177870.htm","node":"4+10+10+0","leaf":true},{"id":988,"o":218343,"text":" Einen virtuellen Administrationsserver aktivieren und deaktivieren ","url":"218343.htm","node":"4+10+10+1","leaf":true},{"id":989,"o":237346,"text":" Einem virtuellen Administrationsserver einen Administrator zuweisen ","url":"237346.htm","node":"4+10+10+2","leaf":true},{"id":990,"o":218291,"text":" Den Administrationsserver fÃ¼r Client-GerÃ¤te Ã¤ndern ","url":"218291.htm","node":"4+10+10+3","leaf":true},{"id":991,"o":218393,"text":" Einen virtuellen Administrationsserver lÃ¶schen ","url":"218393.htm","node":"4+10+10+4","leaf":true}]},{"id":992,"o":211163,"text":" Benutzerkonten-Schutz vor unbefugten Ã„nderungen aktivieren ","url":"211163.htm","node":"4+10+11","leaf":true},{"id":993,"o":211395,"text":" Zweistufige ÃœberprÃ¼fung ","url":"211395.htm","node":"4+10+12","children":[{"id":994,"o":212969,"text":" Szenario: Konfigurieren der zweistufigen ÃœberprÃ¼fung fÃ¼r alle Benutzer ","url":"212969.htm","node":"4+10+12+0","leaf":true},{"id":995,"o":211333,"text":" Ãœber die zweistufige ÃœberprÃ¼fung ","url":"211333.htm","node":"4+10+12+1","leaf":true},{"id":996,"o":211308,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r Ihr eigenes Benutzerkonto aktivieren ","url":"211308.htm","node":"4+10+12+2","leaf":true},{"id":997,"o":211403,"text":" Obligatorische zweistufige ÃœberprÃ¼fung fÃ¼r alle Benutzer aktivieren ","url":"211403.htm","node":"4+10+12+3","leaf":true},{"id":998,"o":211381,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r ein Benutzerkonto deaktivieren ","url":"211381.htm","node":"4+10+12+4","leaf":true},{"id":999,"o":211404,"text":" Obligatorische zweistufige ÃœberprÃ¼fung fÃ¼r alle Benutzer deaktivieren ","url":"211404.htm","node":"4+10+12+5","leaf":true},{"id":1000,"o":211462,"text":" Benutzerkonten von der zweistufigen ÃœberprÃ¼fung ausschlieÃŸen ","url":"211462.htm","node":"4+10+12+6","leaf":true},{"id":1001,"o":211459,"text":" Neuen geheimen SchlÃ¼ssel generieren ","url":"211459.htm","node":"4+10+12+7","leaf":true},{"id":1002,"o":211461,"text":" Name eines Sicherheitscode-Ausstellers bearbeiten ","url":"211461.htm","node":"4+10+12+8","leaf":true},{"id":1003,"o":256957,"text":" Zweistufige ÃœberprÃ¼fung fÃ¼r Ihr eigenes Benutzerkonto konfigurieren ","url":"256957.htm","node":"4+10+12+9","leaf":true},{"id":1004,"o":250558,"text":" Neuen Benutzern die Einrichtung der zweistufigen ÃœberprÃ¼fung fÃ¼r sich selbst verbieten ","url":"250558.htm","node":"4+10+12+10","leaf":true}]},{"id":1005,"o":3667,"text":" Daten des Administrationsservers sichern und wiederherstellen ","url":"3667_1.htm","node":"4+10+13","children":[{"id":1006,"o":233291,"text":" Aufgabe zum Anlegen eines Backups ","url":"233291.htm","node":"4+10+13+0","leaf":true}]},{"id":1007,"o":236441,"text":" Administrationsserver auf anderes GerÃ¤t Ã¼bertragen ","url":"236441.htm","node":"4+10+14","leaf":true}]},{"id":1008,"o":231248,"text":" Erstkonfiguration von Kaspersky Security Center Web Console ","url":"231248.htm","node":"4+11","children":[{"id":1009,"o":171285,"text":" Schnellstartassistent (Kaspersky Security Center Web Console) ","url":"171285.htm","node":"4+11+0","children":[{"id":1010,"o":175963,"text":" Schritt 1. Einstellungen fÃ¼r die Internetverbindung festlegen ","url":"175963.htm","node":"4+11+0+0","leaf":true},{"id":1011,"o":180305,"text":" Schritt 2. Erforderliche Updates herunterladen ","url":"180305.htm","node":"4+11+0+1","leaf":true},{"id":1012,"o":203275,"text":" Schritt 3. Zu sichernde Assets auswÃ¤hlen ","url":"203275.htm","node":"4+11+0+2","leaf":true},{"id":1013,"o":195644,"text":" Schritt 4. Verwendete VerschlÃ¼sselung fÃ¼r die LÃ¶sungen auswÃ¤hlen ","url":"195644.htm","node":"4+11+0+3","leaf":true},{"id":1014,"o":176471,"text":" Schritt 5. Plug-ins fÃ¼r verwaltete Programme konfigurieren ","url":"176471.htm","node":"4+11+0+4","leaf":true},{"id":1015,"o":207854,"text":" Schritt 6. Installieren der ausgewÃ¤hlten Plug-ins ","url":"207854.htm","node":"4+11+0+5","leaf":true},{"id":1016,"o":195647,"text":" Schritt 7. Herunterladen der Programmpakete Erstellen der Installationspakete ","url":"195647.htm","node":"4+11+0+6","leaf":true},{"id":1017,"o":175970,"text":" Schritt 8. Kaspersky Security Network konfigurieren ","url":"175970.htm","node":"4+11+0+7","leaf":true},{"id":1018,"o":176139,"text":" Schritt 9. AuswÃ¤hlen der Methode zur Programmaktivierung ","url":"176139.htm","node":"4+11+0+8","leaf":true},{"id":1019,"o":203283,"text":" Schritt 10. Festlegen der Einstellungen zur Verwaltung von Drittanbieter-Updates ","url":"203283.htm","node":"4+11+0+9","leaf":true},{"id":1020,"o":176001,"text":" Schritt 11. Erstellen einer grundlegenden Konfiguration fÃ¼r Netzwerkschutz ","url":"176001.htm","node":"4+11+0+10","leaf":true},{"id":1021,"o":175966,"text":" Schritt 12. Konfigurieren von E-Mail-Benachrichtigungen ","url":"175966.htm","node":"4+11+0+11","leaf":true},{"id":1022,"o":176019,"text":" Schritt 13. DurchfÃ¼hren einer Netzwerkabfrage ","url":"176019.htm","node":"4+11+0+12","leaf":true},{"id":1023,"o":176020,"text":" Schritt 14. AbschlieÃŸen des Schnellstartassistenten ","url":"176020.htm","node":"4+11+0+13","leaf":true}]},{"id":1024,"o":204432,"text":" Verbinden mobiler GerÃ¤te ","url":"204432_1.htm","node":"4+11+1","children":[{"id":1025,"o":231227,"text":" Szenario: Verbinden von mobilen GerÃ¤ten mittels Verbindungs-Gateway ","url":"231227.htm","node":"4+11+1+0","leaf":true},{"id":1026,"o":240839,"text":" Szenario: Verbinden von mobilen GerÃ¤ten mittels einem sekundÃ¤ren Administrationsserver in der DMZ ","url":"240839.htm","node":"4+11+1+1","leaf":true},{"id":1027,"o":204435,"text":" Ãœber das Verbinden mobiler GerÃ¤te ","url":"204435_1.htm","node":"4+11+1+2","leaf":true},{"id":1028,"o":231226,"text":" Verbinden von externen Desktop-Computern mit dem Administrationsserver ","url":"231226.htm","node":"4+11+1+3","leaf":true},{"id":1029,"o":231206,"text":" Ãœber Verbindungsprofile fÃ¼r mobile Benutzer ","url":"231206.htm","node":"4+11+1+4","leaf":true},{"id":1030,"o":231207,"text":" Erstellen eines Verbindungsprofils fÃ¼r mobile Benutzer ","url":"231207.htm","node":"4+11+1+5","leaf":true},{"id":1031,"o":231193,"text":" Ãœber das Umschalten eines Administrationsagenten auf einen anderen Administrationsserver ","url":"231193.htm","node":"4+11+1+6","leaf":true},{"id":1032,"o":231194,"text":" Erstellen der Regel fÃ¼r die Umstellung des Administrationsagenten gemÃ¤ÃŸ dem Netzwerkspeicherort ","url":"231194.htm","node":"4+11+1+7","leaf":true}]}]},{"id":1033,"o":178756,"text":" Assistent fÃ¼r die Bereitstellung des Schutzes ","url":"178756.htm","node":"4+12","children":[{"id":1034,"o":178757,"text":" Assistent fÃ¼r die Bereitstellung des Schutzes starten ","url":"178757.htm","node":"4+12+0","leaf":true},{"id":1035,"o":178655,"text":" Installationspaket auswÃ¤hlen ","url":"178655.htm","node":"4+12+1","leaf":true},{"id":1036,"o":178662,"text":" Verteilungsmethode der SchlÃ¼sseldatei oder des Aktivierungscodes auswÃ¤hlen ","url":"178662.htm","node":"4+12+2","leaf":true},{"id":1037,"o":178658,"text":" Version des Administrationsagenten auswÃ¤hlen ","url":"178658.htm","node":"4+12+3","leaf":true},{"id":1038,"o":178657,"text":" GerÃ¤te auswÃ¤hlen ","url":"178657.htm","node":"4+12+4","leaf":true},{"id":1039,"o":178659,"text":" Schritt 5. Einstellungen fÃ¼r die Aufgabe zur Remote-Installation festlegen ","url":"178659.htm","node":"4+12+5","leaf":true},{"id":1040,"o":178660,"text":" Schritt 6. Verwaltung des Neustarts ","url":"178660.htm","node":"4+12+6","leaf":true},{"id":1041,"o":178752,"text":" Schritt 7. Deinstallieren inkompatibler Programme vor der Installation ","url":"178752.htm","node":"4+12+7","leaf":true},{"id":1042,"o":178661,"text":" Schritt 8. Verschieben von GerÃ¤ten in die Gruppe &amp;quot;Verwaltete GerÃ¤te&amp;quot; ","url":"178661.htm","node":"4+12+8","leaf":true},{"id":1043,"o":178753,"text":" Schritt 9. AuswÃ¤hlen von Benutzerkonten fÃ¼r den Zugriff auf GerÃ¤ten ","url":"178753.htm","node":"4+12+9","leaf":true},{"id":1044,"o":178755,"text":" Schritt 10. Beginnen der Installation ","url":"178755.htm","node":"4+12+10","leaf":true}]},{"id":1045,"o":180069,"text":" Bereitstellung der Kaspersky-Anwendungen Ã¼ber die Kaspersky Security Center Web Console ","url":"180069.htm","node":"4+13","children":[{"id":1046,"o":175982,"text":" Szenario: Bereitstellung der Programme von Kaspersky Ã¼ber die Kaspersky Security Center Web Console ","url":"175982.htm","node":"4+13+0","leaf":true},{"id":1047,"o":176101,"text":" Beziehen von Plug-ins fÃ¼r Kaspersky-Anwendungen ","url":"176101.htm","node":"4+13+1","leaf":true},{"id":1048,"o":175918,"text":" Installationspakete fÃ¼r Kaspersky-Anwendungen herunterladen und erstellen ","url":"175918.htm","node":"4+13+2","leaf":true},{"id":1049,"o":199338,"text":" GrÃ¶ÃŸenbegrenzung fÃ¼r benutzerdefinierte Installationspakete anpassen ","url":"199338.htm","node":"4+13+3","leaf":true},{"id":1050,"o":180061,"text":" Programmpakete fÃ¼r Kaspersky-Anwendungen herunterladen ","url":"180061.htm","node":"4+13+4","leaf":true},{"id":1051,"o":175977,"text":" Die erfolgreiche Bereitstellung von KasperskyÂ&nbsp;EndpointÂ&nbsp;Security Ã¼berprÃ¼fen ","url":"175977.htm","node":"4+13+5","leaf":true},{"id":1052,"o":182663,"text":" Autonome Installationspakete erstellen ","url":"182663.htm","node":"4+13+6","leaf":true},{"id":1053,"o":187184,"text":" Liste der autonomen Installationspakete anzeigen ","url":"187184.htm","node":"4+13+7","leaf":true},{"id":1054,"o":182501,"text":" Erstellen benutzerdefinierter Installationspakete ","url":"182501.htm","node":"4+13+8","leaf":true},{"id":1055,"o":240995,"text":" Installationspakete an sekundÃ¤re Administrationsserver verteilen ","url":"240995.htm","node":"4+13+9","leaf":true},{"id":1056,"o":6385,"text":" Anwendungen mit der Aufgabe zur Remote-Installation installieren ","url":"6385_1.htm","node":"4+13+10","children":[{"id":1057,"o":236055,"text":" Eine Anwendung remote installieren ","url":"236055.htm","node":"4+13+10+0","leaf":true},{"id":1058,"o":236155,"text":" Programme mit Gruppenrichtlinien des ActiveÂ&nbsp;Directory installieren ","url":"236155.htm","node":"4+13+10+1","leaf":true},{"id":1059,"o":236153,"text":" Anwendungen auf sekundÃ¤ren Administrationsservern installieren ","url":"236153.htm","node":"4+13+10+2","leaf":true}]},{"id":1060,"o":212573,"text":" Einstellungen fÃ¼r die Remote-Installation auf Unix-GerÃ¤ten angeben ","url":"212573.htm","node":"4+13+11","leaf":true},{"id":1061,"o":293238,"text":" Kaspersky-Anwendungen starten und beenden ","url":"293238.htm","node":"4+13+12","leaf":true},{"id":1062,"o":213746,"text":" Verwaltung mobiler GerÃ¤te ","url":"213746.htm","node":"4+13+13","leaf":true},{"id":1063,"o":180093,"text":" Sicherheitsanwendungen von Drittanbietern ersetzen ","url":"180093_1.htm","node":"4+13+14","leaf":true}]},{"id":1064,"o":166084,"text":" GerÃ¤te im Netzwerk finden ","url":"3907_2.htm","node":"4+14","children":[{"id":1065,"o":180094,"text":" Szenario: NetzwerkgerÃ¤te finden ","url":"180094.htm","node":"4+14+0","leaf":true},{"id":1066,"o":259298,"text":" Suchen von GerÃ¤ten ","url":"259298.htm","node":"4+14+1","children":[{"id":1067,"o":166186,"text":" Windows-Netzwerkabfrage ","url":"166186.htm","node":"4+14+1+0","leaf":true},{"id":1068,"o":166184,"text":" IP-Bereiche abfragen ","url":"166184.htm","node":"4+14+1+1","leaf":true},{"id":1069,"o":176003,"text":" IP-Bereich hinzufÃ¼gen und bearbeiten ","url":"176003.htm","node":"4+14+1+2","leaf":true},{"id":1070,"o":221623,"text":" Zeroconf-Abfrage ","url":"221623.htm","node":"4+14+1+3","leaf":true},{"id":1071,"o":257877,"text":" Abfrage des DomÃ¤nencontrollers ","url":"257877.htm","node":"4+14+1+4","leaf":true},{"id":1072,"o":277210,"text":" Authentifizierung und Verbindung mit einem DomÃ¤nencontroller ","url":"277210.htm","node":"4+14+1+5","leaf":true},{"id":1073,"o":257889,"text":" Einen Samba-DomÃ¤nencontroller konfigurieren ","url":"257889.htm","node":"4+14+1+6","leaf":true},{"id":1074,"o":174975,"text":" Aufbewahrungsregeln fÃ¼r nicht zugeordnete GerÃ¤te anpassen ","url":"174975.htm","node":"4+14+1+7","leaf":true}]}]},{"id":1075,"o":3612,"text":" Kaspersky-Anwendungen: Lizenzierung und Aktivierung ","url":"3612_1.htm","node":"4+15","children":[{"id":1076,"o":197024,"text":" Lizenzierung der verwalteten Programme ","url":"180068_2.htm","node":"4+15+0","leaf":true},{"id":1077,"o":179952,"text":" LizenzschlÃ¼ssel zur Datenverwaltung des Administrationsservers hinzufÃ¼gen ","url":"179952.htm","node":"4+15+1","leaf":true},{"id":1078,"o":270011,"text":" LizenzschlÃ¼ssel des Administrationsservers hinzufÃ¼gen ","url":"270011.htm","node":"4+15+2","leaf":true},{"id":1079,"o":179954,"text":" LizenzschlÃ¼ssel auf Client-GerÃ¤te verteilen ","url":"179954.htm","node":"4+15+3","leaf":true},{"id":1080,"o":180049,"text":" LizenzschlÃ¼ssel automatisch verteilen ","url":"180049.htm","node":"4+15+4","leaf":true},{"id":1081,"o":180055,"text":" Informationen zu verwendeten LizenzschlÃ¼sseln anzeigen ","url":"180055.htm","node":"4+15+5","leaf":true},{"id":1082,"o":180115,"text":" LizenzschlÃ¼ssel aus der Datenverwaltung lÃ¶schen ","url":"180115.htm","node":"4+15+6","leaf":true},{"id":1083,"o":199089,"text":" Vereinbarung mit einem Endbenutzer-Lizenzvertrag widerrufen ","url":"199089.htm","node":"4+15+7","leaf":true},{"id":1084,"o":214791,"text":" Lizenzen fÃ¼r Kaspersky-Anwendungen verlÃ¤ngern ","url":"214791.htm","node":"4+15+8","leaf":true},{"id":1085,"o":221110,"text":" Kaspersky Marketplace zum Finden von Kaspersky-UnternehmenslÃ¶sungen verwenden ","url":"221110.htm","node":"4+15+9","leaf":true}]},{"id":1086,"o":171272,"text":" Netzwerkschutz konfigurieren ","url":"171272_1.htm","node":"4+16","children":[{"id":1087,"o":179344,"text":" Szenario: Netzwerkschutz konfigurieren ","url":"179344_1.htm","node":"4+16+0","leaf":true},{"id":1088,"o":179989,"text":" GerÃ¤teorientierte und benutzerorientierte Methode der Sicherheitsverwaltung ","url":"179989.htm","node":"4+16+1","leaf":true},{"id":1089,"o":177128,"text":" Richtlinien einrichten und verwalten: gerÃ¤teorientierte Herangehensweise ","url":"177128_1.htm","node":"4+16+2","leaf":true},{"id":1090,"o":177180,"text":" Richtlinien einrichten und verwalten: benutzerorientierte Herangehensweise ","url":"177180.htm","node":"4+16+3","leaf":true},{"id":1091,"o":219894,"text":" Richtlinieneinstellungen des Administrationsagenten ","url":"219894.htm","node":"4+16+4","children":[{"id":1092,"o":238367,"text":" Vergleich der Richtlinieneinstellungen des Administrationsagenten nach Betriebssystemen ","url":"238367.htm","node":"4+16+4+0","leaf":true}]},{"id":1093,"o":274554,"text":" Den ressourcenschonenden Modus des Administrationsagenten aktivieren und deaktivieren ","url":"274554.htm","node":"4+16+5","leaf":true},{"id":1094,"o":179912,"text":" Richtlinie fÃ¼r Kaspersky Endpoint Security manuell konfigurieren ","url":"179912.htm","node":"4+16+6","children":[{"id":1095,"o":181226,"text":" Kaspersky Security Network konfigurieren ","url":"181226.htm","node":"4+16+6+0","leaf":true},{"id":1096,"o":179919,"text":" Liste der durch die Firewall geschÃ¼tzten Netzwerke Ã¼berprÃ¼fen ","url":"179919.htm","node":"4+16+6+1","leaf":true},{"id":1097,"o":238927,"text":" Untersuchung von NetzwerkdatentrÃ¤gern deaktivieren ","url":"238927.htm","node":"4+16+6+2","leaf":true},{"id":1098,"o":179923,"text":" Programminformationen aus dem Speicher des Administrationsservers ausschlieÃŸen ","url":"179923.htm","node":"4+16+6+3","leaf":true},{"id":1099,"o":238933,"text":" Zugriff auf die BenutzeroberflÃ¤che von Kaspersky Endpoint Security fÃ¼r Windows fÃ¼r Workstations konfigurieren ","url":"238933.htm","node":"4+16+6+4","leaf":true},{"id":1100,"o":181227,"text":" Wichtige Ereignisse von Richtlinien in der Datenbank des Administrationsservers speichern ","url":"181227.htm","node":"4+16+6+5","leaf":true}]},{"id":1101,"o":180029,"text":" Gruppenaufgabe zum Aktualisieren von Kaspersky Endpoint Security manuell konfigurieren ","url":"180029.htm","node":"4+16+7","leaf":true},{"id":1102,"o":184894,"text":" Offline-Zugriff auf ein externes GerÃ¤t gewÃ¤hren, das von der GerÃ¤tekontrolle blockiert wurde ","url":"184894.htm","node":"4+16+8","leaf":true},{"id":1103,"o":202480,"text":" Anwendungen oder Software-Updates per Fernzugriff entfernen ","url":"202480.htm","node":"4+16+9","leaf":true},{"id":1104,"o":165764,"text":" Aufgaben ","url":"165764.htm","node":"4+16+10","children":[{"id":1105,"o":165846,"text":" Ãœber Aufgaben ","url":"165846.htm","node":"4+16+10+0","leaf":true},{"id":1106,"o":175792,"text":" Ãœber den GÃ¼ltigkeitsbereich von Aufgaben ","url":"175792.htm","node":"4+16+10+1","leaf":true},{"id":1107,"o":175983,"text":" Aufgaben erstellen ","url":"175983.htm","node":"4+16+10+2","leaf":true},{"id":1108,"o":189265,"text":" Aufgaben manuell starten ","url":"189265.htm","node":"4+16+10+3","leaf":true},{"id":1109,"o":190998,"text":" Aufgabenliste anzeigen ","url":"190998.htm","node":"4+16+10+4","leaf":true},{"id":1110,"o":182650,"text":" Allgemeine Aufgabeneinstellungen ","url":"182650.htm","node":"4+16+10+5","leaf":true},{"id":1111,"o":240599,"text":" Aufgaben exportieren ","url":"240599.htm","node":"4+16+10+6","leaf":true},{"id":1112,"o":240815,"text":" Aufgaben importieren ","url":"240815.htm","node":"4+16+10+7","leaf":true},{"id":1113,"o":194956,"text":" Assistent zum Ã„ndern der AufgabenkennwÃ¶rter starten ","url":"194956.htm","node":"4+16+10+8","children":[{"id":1114,"o":194957,"text":" Schritt 1. Anmeldedaten angeben ","url":"194957.htm","node":"4+16+10+8+0","leaf":true},{"id":1115,"o":194959,"text":" Schritt 2. AuszufÃ¼hrenden Vorgang auswÃ¤hlen ","url":"194959.htm","node":"4+16+10+8+1","leaf":true},{"id":1116,"o":194960,"text":" Schritt 3. Ergebnisse anzeigen ","url":"194960.htm","node":"4+16+10+8+2","leaf":true}]},{"id":1117,"o":265768,"text":" Aufgabe zur Remote-AusfÃ¼hrung von Skripten erstellen ","url":"265768.htm","node":"4+16+10+9","children":[{"id":1118,"o":267850,"text":" Anwendungen mittels Aufgabe zur Remote-AusfÃ¼hrung von Skripten auf GerÃ¤ten installieren ","url":"267850.htm","node":"4+16+10+9+0","leaf":true},{"id":1119,"o":267852,"text":" Benachrichtigungen und Ãœberwachung fÃ¼r die Aufgabe zur Remote-AusfÃ¼hrung von Skripten konfigurieren ","url":"267852.htm","node":"4+16+10+9+1","leaf":true},{"id":1120,"o":267847,"text":" Archiv fÃ¼r die Aufgabe zur Remote-AusfÃ¼hrung von Skripten vorbereiten ","url":"267847.htm","node":"4+16+10+9+2","leaf":true},{"id":1121,"o":267534,"text":" Installationspaket auf Basis einer Manifestdatei erstellen ","url":"267534.htm","node":"4+16+10+9+3","leaf":true}]}]},{"id":1122,"o":177914,"text":" Client-GerÃ¤te verwalten ","url":"177914.htm","node":"4+16+11","children":[{"id":1123,"o":201874,"text":" Einstellungen eines verwalteten GerÃ¤ts ","url":"201874.htm","node":"4+16+11+0","leaf":true},{"id":1124,"o":213597,"text":" Administrationsgruppen anlegen ","url":"213597.htm","node":"4+16+11+1","leaf":true},{"id":1125,"o":198761,"text":" GerÃ¤te manuell zu einer Administrationsgruppe hinzufÃ¼gen ","url":"198761.htm","node":"4+16+11+2","leaf":true},{"id":1126,"o":194194,"text":" Manuelles Verschieben von GerÃ¤ten oder Clustern in eine Administrationsgruppe ","url":"194194.htm","node":"4+16+11+3","leaf":true},{"id":1127,"o":175901,"text":" Regeln fÃ¼r das Verschieben von GerÃ¤ten erstellen ","url":"175901.htm","node":"4+16+11+4","leaf":true},{"id":1128,"o":177040,"text":" Regeln fÃ¼r das Verschieben von GerÃ¤ten kopieren ","url":"177040.htm","node":"4+16+11+5","leaf":true},{"id":1129,"o":238503,"text":" Bedingungen fÃ¼r Verschiebungsregeln fÃ¼r GerÃ¤te ","url":"238503.htm","node":"4+16+11+6","leaf":true},{"id":1130,"o":246554,"text":" Ãœber Cluster und Server-Arrays ","url":"246554.htm","node":"4+16+11+7","leaf":true},{"id":1131,"o":246991,"text":" Eigenschaften eines Cluster- oder Server-Arrays ","url":"246991.htm","node":"4+16+11+8","leaf":true},{"id":1132,"o":179988,"text":" MaÃŸnahmen anzeigen und konfigurieren, wenn GerÃ¤te als inaktiv angezeigt werden ","url":"179988.htm","node":"4+16+11+9","leaf":true},{"id":1133,"o":191051,"text":" Ãœber die Varianten fÃ¼r den GerÃ¤testatus ","url":"191051.htm","node":"4+16+11+10","leaf":true},{"id":1134,"o":144383,"text":" Wechsel der Statuswerte von GerÃ¤ten konfigurieren ","url":"144383_1.htm","node":"4+16+11+11","leaf":true},{"id":1135,"o":195218,"text":" Remotedesktopverbindung mit dem Client-GerÃ¤t herstellen ","url":"195218.htm","node":"4+16+11+12","leaf":true},{"id":1136,"o":198907,"text":" Verbindung mit den Client-GerÃ¤ten Ã¼ber die WindowsÂ&nbsp;Desktopfreigabe herstellen ","url":"198907.htm","node":"4+16+11+13","leaf":true},{"id":1137,"o":166012,"text":" GerÃ¤teauswahlen ","url":"166012.htm","node":"4+16+11+14","children":[{"id":1138,"o":243445,"text":" GerÃ¤teliste einer GerÃ¤teauswahl anzeigen ","url":"243445.htm","node":"4+16+11+14+0","leaf":true},{"id":1139,"o":209938,"text":" GerÃ¤teauswahl erstellen ","url":"209938.htm","node":"4+16+11+14+1","leaf":true},{"id":1140,"o":209943,"text":" Einstellungen einer GerÃ¤teauswahl anpassen ","url":"209943.htm","node":"4+16+11+14+2","leaf":true},{"id":1141,"o":251033,"text":" GerÃ¤teliste einer GerÃ¤teauswahl exportieren ","url":"251033.htm","node":"4+16+11+14+3","leaf":true},{"id":1142,"o":251146,"text":" GerÃ¤te in der Auswahl aus Administrationsgruppen lÃ¶schen ","url":"251146.htm","node":"4+16+11+14+4","leaf":true}]},{"id":1143,"o":175848,"text":" GerÃ¤te-Tags ","url":"175848.htm","node":"4+16+11+15","children":[{"id":1144,"o":175850,"text":" GerÃ¤te-Tag erstellen ","url":"175850.htm","node":"4+16+11+15+0","leaf":true},{"id":1145,"o":175855,"text":" GerÃ¤te-Tag umbenennen ","url":"175855.htm","node":"4+16+11+15+1","leaf":true},{"id":1146,"o":175856,"text":" GerÃ¤te-Tag lÃ¶schen ","url":"175856.htm","node":"4+16+11+15+2","leaf":true},{"id":1147,"o":175859,"text":" GerÃ¤te mit zugewiesenen Tags anzeigen ","url":"175859.htm","node":"4+16+11+15+3","leaf":true},{"id":1148,"o":175862,"text":" Tags anzeigen, die einem GerÃ¤t zugewiesen sind ","url":"175862.htm","node":"4+16+11+15+4","leaf":true},{"id":1149,"o":175860,"text":" Tags einem GerÃ¤t manuell zuweisen ","url":"175860.htm","node":"4+16+11+15+5","leaf":true},{"id":1150,"o":175861,"text":" Zugewiesene Tags von einem GerÃ¤t entfernen ","url":"175861.htm","node":"4+16+11+15+6","leaf":true},{"id":1151,"o":175849,"text":" Regeln fÃ¼r das automatische Zuweisen von Tags an GerÃ¤ten anzeigen ","url":"175849.htm","node":"4+16+11+15+7","leaf":true},{"id":1152,"o":175967,"text":" Regeln fÃ¼r das automatische Zuweisen von Tags an GerÃ¤te bearbeiten ","url":"175967.htm","node":"4+16+11+15+8","leaf":true},{"id":1153,"o":175878,"text":" Regeln fÃ¼r das automatische Zuweisen von Tags an GerÃ¤te erstellen ","url":"175878.htm","node":"4+16+11+15+9","leaf":true},{"id":1154,"o":175974,"text":" Regeln fÃ¼r das automatische Zuweisen von Tags an GerÃ¤te ausfÃ¼hren ","url":"175974.htm","node":"4+16+11+15+10","leaf":true},{"id":1155,"o":175976,"text":" Regeln fÃ¼r das automatische Zuweisen von Tags an GerÃ¤te lÃ¶schen ","url":"175976.htm","node":"4+16+11+15+11","leaf":true},{"id":1156,"o":244508,"text":" Verwalten von GerÃ¤te-Tags mit dem Tool klscflag ","url":"244508.htm","node":"4+16+11+15+12","children":[{"id":1157,"o":244510,"text":" GerÃ¤te-Tags zuweisen ","url":"244510.htm","node":"4+16+11+15+12+0","leaf":true},{"id":1158,"o":244511,"text":" GerÃ¤te-Tags entfernen ","url":"244511.htm","node":"4+16+11+15+12+1","leaf":true}]}]}]},{"id":1159,"o":165762,"text":" Richtlinien und Richtlinienprofile ","url":"165762_1.htm","node":"4+16+12","children":[{"id":1160,"o":165742,"text":" Ãœber Richtlinien und Richtlinienprofile ","url":"165742.htm","node":"4+16+12+0","leaf":true},{"id":1161,"o":167068,"text":" Ãœber das Schloss und gesperrte Einstellungen ","url":"167068.htm","node":"4+16+12+1","leaf":true},{"id":1162,"o":165771,"text":" Vererbung von Richtlinien und Richtlinienprofilen ","url":"165771.htm","node":"4+16+12+2","children":[{"id":1163,"o":165770,"text":" Hierarchie der Richtlinien ","url":"165770.htm","node":"4+16+12+2+0","leaf":true},{"id":1164,"o":175793,"text":" Richtlinienprofile in einer Hierarchie von Richtlinien ","url":"175793.htm","node":"4+16+12+2+1","leaf":true},{"id":1165,"o":209754,"text":" Implementierung der Einstellungen auf einem verwalteten GerÃ¤t ","url":"209754.htm","node":"4+16+12+2+2","leaf":true}]},{"id":1166,"o":208004,"text":" Richtlinien verwalten ","url":"208004.htm","node":"4+16+12+3","children":[{"id":1167,"o":176804,"text":" Richtlinienliste anzeigen ","url":"176804.htm","node":"4+16+12+3+0","leaf":true},{"id":1168,"o":166295,"text":" Richtlinie erstellen ","url":"166295.htm","node":"4+16+12+3+1","leaf":true},{"id":1169,"o":177380,"text":" Richtlinie Ã¤ndern ","url":"177380.htm","node":"4+16+12+3+2","leaf":true},{"id":1170,"o":177410,"text":" Allgemeine Richtlinieneinstellungen ","url":"177410.htm","node":"4+16+12+3+3","leaf":true},{"id":1171,"o":209023,"text":" Option zur Vererbung einer Richtlinie aktivieren und deaktivieren ","url":"209023.htm","node":"4+16+12+3+4","leaf":true},{"id":1172,"o":171683,"text":" Richtlinien kopieren ","url":"171683.htm","node":"4+16+12+3+5","leaf":true},{"id":1173,"o":171323,"text":" Richtlinie verschieben ","url":"171323.htm","node":"4+16+12+3+6","leaf":true},{"id":1174,"o":240595,"text":" Richtlinien exportieren ","url":"240595.htm","node":"4+16+12+3+7","leaf":true},{"id":1175,"o":240597,"text":" Richtlinien importieren ","url":"240597.htm","node":"4+16+12+3+8","leaf":true},{"id":1176,"o":203532,"text":" Diagramm fÃ¼r den Status der Richtlinienverteilung anzeigen ","url":"203532.htm","node":"4+16+12+3+9","leaf":true},{"id":1177,"o":181204,"text":" Richtlinie nach dem Ereignis &amp;quot;Virenangriff&amp;quot; automatisch aktivieren ","url":"181204.htm","node":"4+16+12+3+10","leaf":true},{"id":1178,"o":171525,"text":" Richtlinien lÃ¶schen ","url":"171525.htm","node":"4+16+12+3+11","leaf":true}]},{"id":1179,"o":208033,"text":" Richtlinienprofile verwalten ","url":"208033.htm","node":"4+16+12+4","children":[{"id":1180,"o":175403,"text":" Profile einer Richtlinie anzeigen ","url":"175403.htm","node":"4+16+12+4+0","leaf":true},{"id":1181,"o":171313,"text":" PrioritÃ¤t eines Richtlinienprofils Ã¤ndern ","url":"171313.htm","node":"4+16+12+4+1","leaf":true},{"id":1182,"o":166297,"text":" Richtlinienprofil erstellen ","url":"166297.htm","node":"4+16+12+4+2","leaf":true},{"id":1183,"o":177486,"text":" Richtlinienprofil Ã¤ndern ","url":"177486.htm","node":"4+16+12+4+3","leaf":true},{"id":1184,"o":175400,"text":" Richtlinienprofil kopieren ","url":"175400.htm","node":"4+16+12+4+4","leaf":true},{"id":1185,"o":177498,"text":" Regeln fÃ¼r die Aktivierung des Richtlinienprofils erstellen ","url":"177498.htm","node":"4+16+12+4+5","leaf":true},{"id":1186,"o":176807,"text":" Richtlinienprofil lÃ¶schen ","url":"176807.htm","node":"4+16+12+4+6","leaf":true}]}]},{"id":1187,"o":195124,"text":" VerschlÃ¼sselung und Datenschutz ","url":"195124.htm","node":"4+16+13","children":[{"id":1188,"o":195125,"text":" Liste der verschlÃ¼sselten Laufwerke anzeigen ","url":"195125.htm","node":"4+16+13+0","leaf":true},{"id":1189,"o":195126,"text":" Liste der VerschlÃ¼sselungsereignisse anzeigen ","url":"195126.htm","node":"4+16+13+1","leaf":true},{"id":1190,"o":195130,"text":" VerschlÃ¼sselungsberichte erstellen und anzeigen ","url":"195130.htm","node":"4+16+13+2","leaf":true},{"id":1191,"o":195131,"text":" Zugriff auf ein verschlÃ¼sseltes Laufwerk im autonomen Modus gewÃ¤hren ","url":"195131.htm","node":"4+16+13+3","leaf":true}]},{"id":1192,"o":165858,"text":" Benutzer und Benutzerrollen ","url":"165858.htm","node":"4+16+14","children":[{"id":1193,"o":165864,"text":" Ãœber Benutzerrollen ","url":"165864.htm","node":"4+16+14+0","leaf":true},{"id":1194,"o":287288,"text":" Benutzerkonten und Sitzungen anzeigen ","url":"287288.htm","node":"4+16+14+1","leaf":true},{"id":1195,"o":203717,"text":" Zugriffsrechte auf Anwendungsfunktionen konfigurieren. Rollenbasierte Zugriffskontrolle ","url":"203717.htm","node":"4+16+14+2","children":[{"id":1196,"o":203748,"text":" Zugriffsrechte auf Programmfunktionen ","url":"203748.htm","node":"4+16+14+2+0","leaf":true},{"id":1197,"o":203750,"text":" Vorkonfigurierte Benutzerrollen ","url":"203750.htm","node":"4+16+14+2+1","leaf":true},{"id":1198,"o":237474,"text":" Bestimmten Objekten Zugriffsrechte zuweisen ","url":"237474.htm","node":"4+16+14+2+2","leaf":true},{"id":1199,"o":256412,"text":" Zugriffsrechte an Benutzer und Sicherheitsgruppen zuweisen ","url":"256412.htm","node":"4+16+14+2+3","leaf":true}]},{"id":1200,"o":176002,"text":" Benutzerkonto fÃ¼r einen internen Benutzer hinzufÃ¼gen ","url":"176002.htm","node":"4+16+14+3","leaf":true},{"id":1201,"o":176021,"text":" Eine Sicherheitsgruppe erstellen ","url":"176021.htm","node":"4+16+14+4","leaf":true},{"id":1202,"o":176023,"text":" Benutzerkonto eines internen Benutzers bearbeiten ","url":"176023.htm","node":"4+16+14+5","leaf":true},{"id":1203,"o":176112,"text":" Eine Sicherheitsgruppe bearbeiten ","url":"176112.htm","node":"4+16+14+6","leaf":true},{"id":1204,"o":259383,"text":" Einem Benutzer oder einer Sicherheitsgruppe eine Rolle zuweisen ","url":"259383.htm","node":"4+16+14+7","leaf":true},{"id":1205,"o":176304,"text":" Benutzerkonten zu einer internen Sicherheitsgruppe hinzufÃ¼gen ","url":"176304.htm","node":"4+16+14+8","leaf":true},{"id":1206,"o":176311,"text":" Benutzer zu GerÃ¤tebesitzern ernennen ","url":"176311.htm","node":"4+16+14+9","leaf":true},{"id":1207,"o":267905,"text":" Benutzer nach der Installation des Administrationsagenten zum Linux-GerÃ¤tebesitzer ernennen ","url":"267905.htm","node":"4+16+14+10","leaf":true},{"id":1208,"o":176022,"text":" LÃ¶schen eines Benutzers oder einer Sicherheitsgruppe ","url":"176022.htm","node":"4+16+14+11","leaf":true},{"id":1209,"o":287090,"text":" Kennwort eines Benutzerkontos Ã¤ndern ","url":"287090.htm","node":"4+16+14+12","leaf":true},{"id":1210,"o":176121,"text":" Benutzerrollen erstellen ","url":"176121.htm","node":"4+16+14+13","leaf":true},{"id":1211,"o":176250,"text":" Benutzerrollen bearbeiten ","url":"176250.htm","node":"4+16+14+14","leaf":true},{"id":1212,"o":176256,"text":" GÃ¼ltigkeitsbereich einer Benutzerrolle bearbeiten ","url":"176256.htm","node":"4+16+14+15","leaf":true},{"id":1213,"o":176252,"text":" Benutzerrollen lÃ¶schen ","url":"176252.htm","node":"4+16+14+16","leaf":true},{"id":1214,"o":166091,"text":" Richtlinienprofile mit Rollen verbinden ","url":"166091.htm","node":"4+16+14+17","leaf":true},{"id":1215,"o":275020,"text":" Kennwort des Benutzerkontos Ã¤ndern ","url":"275020.htm","node":"4+16+14+18","leaf":true},{"id":1216,"o":275021,"text":" Lokale Administratorrechte entziehen ","url":"275021.htm","node":"4+16+14+19","leaf":true}]},{"id":1217,"o":233302,"text":" Umgang mit Objekt-Revisionen ","url":"233302.htm","node":"4+16+15","children":[{"id":1218,"o":177418,"text":" Objekte auf eine frÃ¼here Version zurÃ¼ck rollen ","url":"177418.htm","node":"4+16+15+0","leaf":true},{"id":1219,"o":233304,"text":" HinzufÃ¼gen einer Beschreibung der Revision ","url":"233304.htm","node":"4+16+15+1","leaf":true},{"id":1220,"o":274565,"text":" Revision einer Richtlinie anzeigen und speichern ","url":"274565.htm","node":"4+16+15+2","leaf":true}]},{"id":1221,"o":171696,"text":" Objekte lÃ¶schen ","url":"171696_1.htm","node":"4+16+16","leaf":true},{"id":1222,"o":89310,"text":" KasperskyÂ&nbsp;SecurityÂ&nbsp;Network (KSN) ","url":"89310_1.htm","node":"4+16+17","children":[{"id":1223,"o":89311,"text":" Ãœber KSN ","url":"89311_1.htm","node":"4+16+17+0","leaf":true},{"id":1224,"o":213008,"text":" Zugriff auf KSN einrichten ","url":"213008.htm","node":"4+16+17+1","leaf":true},{"id":1225,"o":213009,"text":" Verwendung von KSN aktivieren und deaktivieren ","url":"213009.htm","node":"4+16+17+2","leaf":true},{"id":1226,"o":213010,"text":" Die akzeptierte KSN-ErklÃ¤rung anzeigen ","url":"213010.htm","node":"4+16+17+3","leaf":true},{"id":1227,"o":213147,"text":" Eine aktualisierte KSN-ErklÃ¤rung akzeptieren ","url":"213147.htm","node":"4+16+17+4","leaf":true},{"id":1228,"o":178325,"text":" Feststellen, ob der Verteilungspunkt als KSN-Proxyserver fungiert ","url":"178325_1.htm","node":"4+16+17+5","leaf":true}]}]},{"id":1229,"o":179979,"text":" Szenario: Upgrades von Kaspersky Security Center und der verwalteten Sicherheitsanwendungen ","url":"179979.htm","node":"4+17","leaf":true},{"id":1230,"o":180963,"text":" Datenbanken und Anwendungen von Kaspersky aktualisieren ","url":"180963.htm","node":"4+18","children":[{"id":1231,"o":180689,"text":" Szenario: Datenbanken und Programme von Kaspersky regelmÃ¤ÃŸig aktualisieren ","url":"180689_1.htm","node":"4+18+0","leaf":true},{"id":1232,"o":46875,"text":" Ãœber das Aktualisieren der Datenbanken, Software-Module und Programme von Kaspersky ","url":"46875_1.htm","node":"4+18+1","leaf":true},{"id":1233,"o":180697,"text":" Aufgabe zum Download von Updates in die Datenverwaltung des Administrationsservers erstellen ","url":"180697.htm","node":"4+18+2","leaf":true},{"id":1234,"o":181095,"text":" Heruntergeladene Updates prÃ¼fen ","url":"181095.htm","node":"4+18+3","leaf":true},{"id":1235,"o":180731,"text":" Aufgabe zum Download von Updates in die Datenverwaltung der Verteilungspunkte erstellen ","url":"180731.htm","node":"4+18+4","leaf":true},{"id":1236,"o":180747,"text":" Automatische Installation von Updates und Patches fÃ¼r die Komponenten von Kaspersky Security Center aktivieren und deaktivieren ","url":"180747.htm","node":"4+18+5","leaf":true},{"id":1237,"o":180749,"text":" Automatische Installation von Updates fÃ¼r Kaspersky Endpoint Security fÃ¼r Windows ","url":"180749.htm","node":"4+18+6","leaf":true},{"id":1238,"o":180195,"text":" Programm-Updates genehmigen und ablehnen ","url":"180195.htm","node":"4+18+7","leaf":true},{"id":1239,"o":209563,"text":" Aktualisieren des Administrationsservers ","url":"209563.htm","node":"4+18+8","leaf":true},{"id":1240,"o":181202,"text":" Autonomes Modell fÃ¼r den Download von Updates aktivieren und deaktivieren ","url":"181202.htm","node":"4+18+9","leaf":true},{"id":1241,"o":180902,"text":" Datenbanken und Software-Module von Kaspersky auf autonomen GerÃ¤ten aktualisieren ","url":"180902.htm","node":"4+18+10","leaf":true},{"id":1242,"o":228405,"text":" Web-Plugins sichern und wiederherstellen ","url":"228405.htm","node":"4+18+11","leaf":true},{"id":1243,"o":92429,"text":" Verteilungspunkte und Verbindungs-Gateways anpassen ","url":"92429_1.htm","node":"4+18+12","children":[{"id":1244,"o":92430,"text":" Typische Konfiguration von Verteilungspunkten: EinzelbÃ¼ro ","url":"92430_1.htm","node":"4+18+12+0","leaf":true},{"id":1245,"o":92431,"text":" Typische Konfiguration von Verteilungspunkten: Mehrere kleine, eigenstÃ¤ndige BÃ¼ros ","url":"92431_1.htm","node":"4+18+12+1","leaf":true},{"id":1246,"o":226596,"text":" Ãœber das Zuweisen von Verteilungspunkten ","url":"226596.htm","node":"4+18+12+2","leaf":true},{"id":1247,"o":181627,"text":" Verteilungspunkte automatisch zuweisen ","url":"181627.htm","node":"4+18+12+3","leaf":true},{"id":1248,"o":181511,"text":" Verteilungspunkte manuell zuweisen ","url":"181511.htm","node":"4+18+12+4","leaf":true},{"id":1249,"o":181540,"text":" Liste mit Verteilungspunkten fÃ¼r eine Administrationsgruppe bearbeiten ","url":"181540.htm","node":"4+18+12+5","leaf":true},{"id":1250,"o":175431,"text":" Erzwungene Synchronisierung ","url":"175431.htm","node":"4+18+12+6","leaf":true},{"id":1251,"o":214620,"text":" Push-Server aktivieren ","url":"214620.htm","node":"4+18+12+7","leaf":true}]}]},{"id":1252,"o":183833,"text":" Drittanbieter-Programme auf Client-GerÃ¤ten verwalten ","url":"183833.htm","node":"4+19","children":[{"id":1253,"o":222479,"text":" Ãœber Anwendungen von Drittanbietern ","url":"222479.htm","node":"4+19+0","leaf":true},{"id":1254,"o":183832,"text":" Updates fÃ¼r Drittanbieter-Programme installieren ","url":"183832.htm","node":"4+19+1","children":[{"id":1255,"o":183968,"text":" Szenario: Aktualisieren von Software von Drittanbietern ","url":"183968_1.htm","node":"4+19+1+0","leaf":true},{"id":1256,"o":183925,"text":" Updates fÃ¼r Drittanbieter-Programme installieren ","url":"183925.htm","node":"4+19+1+1","leaf":true},{"id":1257,"o":183915,"text":" Erstellen der Aufgabe &amp;quot;Suche nach Schwachstellen und erforderlichen Updates&amp;quot; ","url":"183915.htm","node":"4+19+1+2","leaf":true},{"id":1258,"o":182643,"text":" Einstellungen der Aufgabe zur Suche nach Schwachstellen und erforderlichen Updates ","url":"182643.htm","node":"4+19+1+3","leaf":true},{"id":1259,"o":182671,"text":" Aufgabe &amp;quot;Erforderliche Updates installieren und Schwachstellen schlieÃŸen&amp;quot; erstellen ","url":"182671.htm","node":"4+19+1+4","leaf":true},{"id":1260,"o":182798,"text":" Regeln fÃ¼r die Update-Installation hinzufÃ¼gen ","url":"182798.htm","node":"4+19+1+5","leaf":true},{"id":1261,"o":183852,"text":" Erstellen der Aufgabe &amp;quot;Windows-Updates installieren&amp;quot; ","url":"183852.htm","node":"4+19+1+6","leaf":true},{"id":1262,"o":183789,"text":" Informationen zu verfÃ¼gbaren Updates fÃ¼r Drittanbieter-Programme anzeigen ","url":"183789.htm","node":"4+19+1+7","leaf":true},{"id":1263,"o":187095,"text":" Liste der verfÃ¼gbaren Software-Updates in eine Datei exportieren ","url":"187095.htm","node":"4+19+1+8","leaf":true},{"id":1264,"o":183775,"text":" Genehmigen und Ablehnen der Updates fÃ¼r Drittanbieter-Programme ","url":"183775.htm","node":"4+19+1+9","leaf":true},{"id":1265,"o":201321,"text":" Erstellen der Aufgabe &amp;quot;Windows-Updates synchronisieren&amp;quot; ","url":"201321.htm","node":"4+19+1+10","leaf":true},{"id":1266,"o":181247,"text":" Drittanbieter-Anwendungen automatisch aktualisieren ","url":"181247.htm","node":"4+19+1+11","leaf":true}]},{"id":1267,"o":183092,"text":" Schwachstellen in Drittanbieter-Anwendungen schlieÃŸen ","url":"183092.htm","node":"4+19+2","children":[{"id":1268,"o":184124,"text":" Szenario: Finden und SchlieÃŸen von Schwachstellen in Programmen von Drittanbietern ","url":"184124_1.htm","node":"4+19+2+0","leaf":true},{"id":1269,"o":183975,"text":" Ãœber die Suche nach und das SchlieÃŸen von Software-Schwachstellen ","url":"183975_1.htm","node":"4+19+2+1","leaf":true},{"id":1270,"o":182760,"text":" Schwachstellen in Drittanbieter-Anwendungen schlieÃŸen ","url":"182760.htm","node":"4+19+2+2","leaf":true},{"id":1271,"o":201980,"text":" Erstellen der Aufgabe &amp;quot;Schwachstellen schlieÃŸen&amp;quot; ","url":"201980.htm","node":"4+19+2+3","leaf":true},{"id":1272,"o":182671,"text":" Aufgabe &amp;quot;Erforderliche Updates installieren und Schwachstellen schlieÃŸen&amp;quot; erstellen ","url":"182671_1.htm","node":"4+19+2+4","leaf":true},{"id":1273,"o":182798,"text":" Regeln fÃ¼r die Update-Installation hinzufÃ¼gen ","url":"182798_1.htm","node":"4+19+2+5","leaf":true},{"id":1274,"o":186529,"text":" AuswÃ¤hlen von Benutzerkorrekturen fÃ¼r Schwachstellen in Programmen von Drittanbietern ","url":"186529.htm","node":"4+19+2+6","leaf":true},{"id":1275,"o":183094,"text":" Anzeigen von Informationen zu Schwachstellen in Programmen, die auf allen verwalteten GerÃ¤ten erkannt wurden ","url":"183094.htm","node":"4+19+2+7","leaf":true},{"id":1276,"o":184794,"text":" Anzeigen von Informationen zu Schwachstellen in Programmen, die auf dem ausgewÃ¤hlten verwalteten GerÃ¤t erkannt wurden ","url":"184794.htm","node":"4+19+2+8","leaf":true},{"id":1277,"o":183984,"text":" Statistik Ã¼ber Schwachstellen auf verwalteten GerÃ¤ten anzeigen ","url":"183984.htm","node":"4+19+2+9","leaf":true},{"id":1278,"o":183983,"text":" Exportieren der Liste von Schwachstellen in Programmen in eine Datei ","url":"183983.htm","node":"4+19+2+10","leaf":true},{"id":1279,"o":184132,"text":" Ignorieren von Schwachstellen in Programmen ","url":"184132.htm","node":"4+19+2+11","leaf":true}]},{"id":1280,"o":184060,"text":" Verwalten des Programmstarts auf Client-GerÃ¤ten ","url":"184060.htm","node":"4+19+3","children":[{"id":1281,"o":297730,"text":" Programmkontrolle zur Verwaltung ausfÃ¼hrbarer Dateien verwenden ","url":"183681_1.htm","node":"4+19+3+0","children":[{"id":1282,"o":184061,"text":" Modi und Kategorien der Programmkontrolle ","url":"184061.htm","node":"4+19+3+0+0","leaf":true},{"id":1283,"o":184064,"text":" Liste der auf Client-GerÃ¤ten gespeicherten ausfÃ¼hrbaren Dateien abrufen und anzeigen ","url":"184064.htm","node":"4+19+3+0+1","leaf":true},{"id":1284,"o":184075,"text":" Erstellen einer manuell zu erweiternden Programmkategorie ","url":"184075.htm","node":"4+19+3+0+2","leaf":true},{"id":1285,"o":184076,"text":" Programmkategorie mit ausfÃ¼hrbaren Dateien von ausgewÃ¤hlten GerÃ¤ten erstellen ","url":"184076.htm","node":"4+19+3+0+3","leaf":true},{"id":1286,"o":184077,"text":" Erstellen einer Programmkategorie mit ausfÃ¼hrbaren Dateien aus einem ausgewÃ¤hlten Ordner ","url":"184077.htm","node":"4+19+3+0+4","leaf":true},{"id":1287,"o":191028,"text":" Liste der Programmkategorien anzeigen ","url":"191028.htm","node":"4+19+3+0+5","leaf":true},{"id":1288,"o":186329,"text":" Ereignisbezogene ausfÃ¼hrbare Dateien zur Programmkategorie hinzufÃ¼gen ","url":"186329.htm","node":"4+19+3+0+6","leaf":true},{"id":1289,"o":184079,"text":" Programmkontrolle in der Richtlinie von Kaspersky Endpoint Security fÃ¼r Windows konfigurieren ","url":"184079.htm","node":"4+19+3+0+7","leaf":true}]},{"id":1290,"o":184063,"text":" Liste der auf Client-GerÃ¤ten installierten Anwendungen abrufen und anzeigen ","url":"184063.htm","node":"4+19+3+1","leaf":true}]},{"id":1291,"o":201899,"text":" Installationspaket eines Drittanbieter-Programms aus der Kaspersky-Datenbank erstellen ","url":"201899.htm","node":"4+19+4","leaf":true},{"id":1292,"o":201981,"text":" Einstellungen des Installationspakets eines Drittanbieter-Programms aus der Kaspersky-Datenbank anzeigen und anpassen ","url":"201981.htm","node":"4+19+5","leaf":true},{"id":1293,"o":202244,"text":" Einstellungen des Installationspakets eines Drittanbieter-Programms aus der Kaspersky-Datenbank ","url":"202244.htm","node":"4+19+6","leaf":true},{"id":1294,"o":147214,"text":" Anwendungs-Tags ","url":"147214.htm","node":"4+19+7","children":[{"id":1295,"o":160698,"text":" Anwendungs-Tag erstellen ","url":"160698.htm","node":"4+19+7+0","leaf":true},{"id":1296,"o":177853,"text":" Anwendungs-Tag umbenennen ","url":"177853.htm","node":"4+19+7+1","leaf":true},{"id":1297,"o":177855,"text":" Einer Anwendung Tags zuweisen ","url":"177855.htm","node":"4+19+7+2","leaf":true},{"id":1298,"o":177857,"text":" Zugewiesene Tags von einer Anwendung entfernen ","url":"177857.htm","node":"4+19+7+3","leaf":true},{"id":1299,"o":177856,"text":" Anwendungs-Tag lÃ¶schen ","url":"177856.htm","node":"4+19+7+4","leaf":true}]}]},{"id":1300,"o":165803,"text":" Ãœberwachung und Berichterstattung ","url":"165803.htm","node":"4+20","children":[{"id":1301,"o":180118,"text":" Szenario: Ãœberwachung und Berichterstattung ","url":"180118.htm","node":"4+20+0","leaf":true},{"id":1302,"o":180005,"text":" Ãœber die Arten der Ãœberwachung und Berichterstattung ","url":"180005.htm","node":"4+20+1","leaf":true},{"id":1303,"o":233381,"text":" Dashboard und Widgets ","url":"233381.htm","node":"4+20+2","children":[{"id":1304,"o":166064,"text":" Dashboard verwenden ","url":"166064.htm","node":"4+20+2+0","leaf":true},{"id":1305,"o":176350,"text":" Dem Dashboard Widgets hinzufÃ¼gen ","url":"176350.htm","node":"4+20+2+1","leaf":true},{"id":1306,"o":176354,"text":" Widgets im Dashboard verbergen ","url":"176354.htm","node":"4+20+2+2","leaf":true},{"id":1307,"o":176362,"text":" Widgets auf dem Dashboard verschieben ","url":"176362.htm","node":"4+20+2+3","leaf":true},{"id":1308,"o":176369,"text":" GrÃ¶ÃŸe oder Darstellung von Widgets Ã¤ndern ","url":"176369.htm","node":"4+20+2+4","leaf":true},{"id":1309,"o":176370,"text":" Einstellungen von Widgets Ã¤ndern ","url":"176370.htm","node":"4+20+2+5","leaf":true},{"id":1310,"o":229787,"text":" Ãœber den Nur-Dashboard-Modus ","url":"229787.htm","node":"4+20+2+6","leaf":true},{"id":1311,"o":229700,"text":" Nur-Dashboard-Modus konfigurieren ","url":"229700.htm","node":"4+20+2+7","leaf":true}]},{"id":1312,"o":233382,"text":" Berichte ","url":"233382.htm","node":"4+20+3","children":[{"id":1313,"o":166065,"text":" Berichte verwenden ","url":"166065.htm","node":"4+20+3+0","leaf":true},{"id":1314,"o":176425,"text":" Berichtsvorlage erstellen ","url":"176425.htm","node":"4+20+3+1","leaf":true},{"id":1315,"o":176428,"text":" Eigenschaften von Berichtsvorlagen anzeigen und bearbeiten ","url":"176428.htm","node":"4+20+3+2","leaf":true},{"id":1316,"o":176429,"text":" Einen Bericht in eine Datei exportieren ","url":"176429.htm","node":"4+20+3+3","leaf":true},{"id":1317,"o":176423,"text":" Bericht erstellen und anzeigen ","url":"176423.htm","node":"4+20+3+4","leaf":true},{"id":1318,"o":176430,"text":" Aufgabe zum Berichtsversand anlegen ","url":"176430.htm","node":"4+20+3+5","leaf":true},{"id":1319,"o":176417,"text":" Berichtsvorlagen lÃ¶schen ","url":"176417.htm","node":"4+20+3+6","leaf":true}]},{"id":1320,"o":233383,"text":" Ereignisse und Ereignisauswahl ","url":"233383.htm","node":"4+20+4","children":[{"id":1321,"o":246462,"text":" Ãœber Kaspersky Security Center ","url":"246462.htm","node":"4+20+4+0","leaf":true},{"id":1322,"o":166234,"text":" Ereignisauswahlen verwenden ","url":"166234.htm","node":"4+20+4+1","leaf":true},{"id":1323,"o":176385,"text":" Ereignisauswahl erstellen ","url":"176385.htm","node":"4+20+4+2","leaf":true},{"id":1324,"o":177708,"text":" Ereignisauswahl bearbeiten ","url":"177708.htm","node":"4+20+4+3","leaf":true},{"id":1325,"o":176415,"text":" Liste mit einer Ereignisauswahl anzeigen ","url":"176415.htm","node":"4+20+4+4","leaf":true},{"id":1326,"o":236067,"text":" Ereignisauswahl exportieren ","url":"236067.htm","node":"4+20+4+5","leaf":true},{"id":1327,"o":236654,"text":" Ereignisauswahl importieren ","url":"236654.htm","node":"4+20+4+6","leaf":true},{"id":1328,"o":171287,"text":" Informationen zu einem Ereignis anzeigen ","url":"171287.htm","node":"4+20+4+7","leaf":true},{"id":1329,"o":178646,"text":" Ereignisse in eine Datei exportieren ","url":"178646.htm","node":"4+20+4+8","leaf":true},{"id":1330,"o":177727,"text":" Verlauf eines Objekts aus einem Ereignis heraus anzeigen ","url":"177727.htm","node":"4+20+4+9","leaf":true},{"id":1331,"o":178626,"text":" Ereignisse lÃ¶schen ","url":"178626.htm","node":"4+20+4+10","leaf":true},{"id":1332,"o":176418,"text":" Ereignisauswahl lÃ¶schen ","url":"176418.htm","node":"4+20+4+11","leaf":true},{"id":1333,"o":178622,"text":" Speicherdauer fÃ¼r ein Ereignis festlegen ","url":"178622.htm","node":"4+20+4+12","leaf":true},{"id":1334,"o":151336,"text":" Ereignisse der Komponenten von Kaspersky Security Center ","url":"151336_1.htm","node":"4+20+4+13","children":[{"id":1335,"o":181756,"text":" Datenstruktur der Beschreibungen von Ereignistypen ","url":"181756_1.htm","node":"4+20+4+13+0","leaf":true},{"id":1336,"o":184666,"text":" Ereignisse des Administrationsservers ","url":"184666_1.htm","node":"4+20+4+13+1","children":[{"id":1337,"o":177080,"text":" Ereignisse des Administrationsservers: Kritisch ","url":"177080_1.htm","node":"4+20+4+13+1+0","leaf":true},{"id":1338,"o":177081,"text":" Ereignisse des Administrationsservers: Funktionsfehler ","url":"177081_1.htm","node":"4+20+4+13+1+1","leaf":true},{"id":1339,"o":177082,"text":" Ereignisse des Administrationsservers: Warnung ","url":"177082_1.htm","node":"4+20+4+13+1+2","leaf":true},{"id":1340,"o":177083,"text":" Ereignisse des Administrationsservers: Information ","url":"177083.htm","node":"4+20+4+13+1+3","leaf":true}]},{"id":1341,"o":184667,"text":" Ereignisse des Administrationsagenten ","url":"184667_1.htm","node":"4+20+4+13+2","children":[{"id":1342,"o":165484,"text":" Administrationsagent: Ereignisse bei Funktionsfehlern ","url":"165484_1.htm","node":"4+20+4+13+2+0","leaf":true},{"id":1343,"o":173538,"text":" Ereignisse des Administrationsagenten: Warnung ","url":"173538_1.htm","node":"4+20+4+13+2+1","leaf":true},{"id":1344,"o":173727,"text":" Ereignisse des Administrationsagenten: Information ","url":"173727_1.htm","node":"4+20+4+13+2+2","leaf":true}]},{"id":1345,"o":184668,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers ","url":"184668_1.htm","node":"4+20+4+13+3","children":[{"id":1346,"o":177141,"text":" Ereignisse des iOS MDM-Servers: Funktionsfehler ","url":"177141_1.htm","node":"4+20+4+13+3+0","leaf":true},{"id":1347,"o":177143,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers: Warnung ","url":"177143_1.htm","node":"4+20+4+13+3+1","leaf":true},{"id":1348,"o":177142,"text":" Ereignisse des iOSÂ&nbsp;MDM-Servers: Information ","url":"177142_1.htm","node":"4+20+4+13+3+2","leaf":true}]}]},{"id":1349,"o":212870,"text":" HÃ¤ufige auftretende Ereignisse blockieren ","url":"212870.htm","node":"4+20+4+14","children":[{"id":1350,"o":212440,"text":" Ãœber das Blockieren von hÃ¤ufig auftretenden Ereignissen ","url":"212440.htm","node":"4+20+4+14+0","leaf":true},{"id":1351,"o":212657,"text":" Das Blockieren hÃ¤ufig auftretender Ereignissen verwalten ","url":"212657.htm","node":"4+20+4+14+1","leaf":true},{"id":1352,"o":212658,"text":" Die Blockade hÃ¤ufig auftretender Ereignisse aufheben ","url":"212658.htm","node":"4+20+4+14+2","leaf":true}]},{"id":1353,"o":228385,"text":" Ereignisse von Kaspersky Security fÃ¼r Microsoft Exchange Server empfangen ","url":"228385.htm","node":"4+20+4+15","leaf":true}]},{"id":1354,"o":233384,"text":" Benachrichtigungen und GerÃ¤testatus ","url":"233384.htm","node":"4+20+5","children":[{"id":1355,"o":179103,"text":" Benachrichtigungen verwenden ","url":"179103.htm","node":"4+20+5+0","leaf":true},{"id":1356,"o":180897,"text":" Bildschirmbenachrichtigungen anzeigen ","url":"180897.htm","node":"4+20+5+1","leaf":true},{"id":1357,"o":191051,"text":" Ãœber die Varianten fÃ¼r den GerÃ¤testatus ","url":"191051_1.htm","node":"4+20+5+2","leaf":true},{"id":1358,"o":181770,"text":" Wechsel der Statuswerte von GerÃ¤ten konfigurieren ","url":"181770.htm","node":"4+20+5+3","leaf":true},{"id":1359,"o":180968,"text":" Einstellungen fÃ¼r das Versenden von Benachrichtigungen anpassen ","url":"180968.htm","node":"4+20+5+4","leaf":true},{"id":1360,"o":84509,"text":" Benachrichtigung Ã¼ber Ereignisse mithilfe einer ausfÃ¼hrbaren Datei ","url":"84509_1.htm","node":"4+20+5+5","leaf":true}]},{"id":1361,"o":233385,"text":" Kaspersky-Mitteilungen ","url":"233385.htm","node":"4+20+6","children":[{"id":1362,"o":210552,"text":" Ãœber Kaspersky-Mitteilungen ","url":"210552.htm","node":"4+20+6+0","leaf":true},{"id":1363,"o":210635,"text":" Einstellungen fÃ¼r die Kaspersky-Mitteilungen festlegen ","url":"210635.htm","node":"4+20+6+1","leaf":true},{"id":1364,"o":210639,"text":" Kaspersky-Mitteilungen deaktivieren ","url":"210639.htm","node":"4+20+6+2","leaf":true}]},{"id":1365,"o":215743,"text":" Informationen Ã¼ber die Erkennung von Bedrohungen anzeigen ","url":"215743.htm","node":"4+20+7","leaf":true},{"id":1366,"o":274416,"text":" Cloud Discovery ","url":"126963.htm","node":"4+20+8","children":[{"id":1367,"o":274417,"text":" CloudÂ&nbsp;Discovery Ã¼ber das Widget aktivieren ","url":"138009.htm","node":"4+20+8+0","leaf":true},{"id":1368,"o":274418,"text":" CloudÂ&nbsp;Discovery-Widget zum Dashboard hinzufÃ¼gen ","url":"266252.htm","node":"4+20+8+1","leaf":true},{"id":1369,"o":274419,"text":" Informationen zur Nutzung von Cloud-Diensten anzeigen ","url":"123382.htm","node":"4+20+8+2","leaf":true},{"id":1370,"o":274420,"text":" Risikostufe eines Cloud-Dienstes ","url":"222985.htm","node":"4+20+8+3","leaf":true},{"id":1371,"o":274421,"text":" Zugriffs auf unerwÃ¼nschte Cloud-Dienste blockieren ","url":"139384.htm","node":"4+20+8+4","leaf":true}]}]},{"id":1372,"o":179949,"text":" Protokollieren der AktivitÃ¤ten der Kaspersky Security Center Web Console ","url":"179949.htm","node":"4+21","leaf":true},{"id":1373,"o":213028,"text":" Integration von Kaspersky Security Center und weiteren LÃ¶sungen ","url":"213028.htm","node":"4+22","children":[{"id":1374,"o":212566,"text":" Hintergrundverbindung herstellen ","url":"212566.htm","node":"4+22+0","leaf":true},{"id":1375,"o":216130,"text":" Ereignisse in SIEM-Systeme exportieren ","url":"216130.htm","node":"4+22+1","children":[{"id":1376,"o":151328,"text":" Ereignisexport in SIEM-Systeme konfigurieren ","url":"151328_1.htm","node":"4+22+1+0","leaf":true},{"id":1377,"o":151329,"text":" VorlÃ¤ufige Bedingungen ","url":"151329_1.htm","node":"4+22+1+1","leaf":true},{"id":1378,"o":151331,"text":" Ãœber Ereignisse in Kaspersky Security Center ","url":"151331_1.htm","node":"4+22+1+2","leaf":true},{"id":1379,"o":151330,"text":" Ãœber den Ereignisexport ","url":"151330_1.htm","node":"4+22+1+3","leaf":true},{"id":1380,"o":151335,"text":" Ãœber das Konfigurieren des Ereignisexports in ein SIEM-System ","url":"151335_1.htm","node":"4+22+1+4","leaf":true},{"id":1381,"o":218223,"text":" Ereignisse zum Export in SIEM-Systeme im Syslog-Format markieren ","url":"218223_1.htm","node":"4+22+1+5","children":[{"id":1382,"o":151327,"text":" Ãœber das Markieren von Ereignissen zum Export in SIEM-Systeme im Syslog-Format ","url":"151327.htm","node":"4+22+1+5+0","leaf":true},{"id":1383,"o":218295,"text":" Ereignisse von Kaspersky-Anwendungen zum Export im Syslog-Format markieren ","url":"218295.htm","node":"4+22+1+5+1","leaf":true},{"id":1384,"o":215566,"text":" Allgemeine Ereignisse zum Export im Syslog-Format markieren ","url":"215566.htm","node":"4+22+1+5+2","leaf":true}]},{"id":1385,"o":151345,"text":" Ãœber das Exportieren von Ereignissen mittels der Formate CEF und LEEF ","url":"151345_1.htm","node":"4+22+1+6","leaf":true},{"id":1386,"o":298793,"text":" Ereignisse in das CEF- oder LEEF-Format konvertieren ","url":"298793.htm","node":"4+22+1+7","leaf":true},{"id":1387,"o":151333,"text":" Ãœber das Exportieren von Ereignissen im Syslog-Format ","url":"151333_1.htm","node":"4+22+1+8","leaf":true},{"id":1388,"o":216090,"text":" Konfiguration von Kaspersky Security Center fÃ¼r den Export an ein SIEM-System ","url":"216090.htm","node":"4+22+1+9","leaf":true},{"id":1389,"o":151344,"text":" Ereignisse direkt aus der Datenbank exportieren ","url":"151344_1.htm","node":"4+22+1+10","children":[{"id":1390,"o":151343,"text":" Eine SQL-Abfrage mit dem Tool &amp;quot;klsql2&amp;quot; ausfÃ¼hren ","url":"151343_1.htm","node":"4+22+1+10+0","leaf":true},{"id":1391,"o":151338,"text":" Beispielhafte SQL-Abfrage, die mit dem Tool &amp;quot;klsql2&amp;quot; erstellt wurde ","url":"151338_1.htm","node":"4+22+1+10+1","leaf":true},{"id":1392,"o":228689,"text":" Anzeige des Namens der Datenbank von Kaspersky Security Center ","url":"228689.htm","node":"4+22+1+10+2","leaf":true}]},{"id":1393,"o":151340,"text":" Exportergebnisse anzeigen ","url":"151340_1.htm","node":"4+22+1+11","leaf":true}]}]},{"id":1394,"o":198790,"text":" Arbeiten mit Kaspersky Security Center Web Console in einer Cloud-Umgebung ","url":"198790.htm","node":"4+23","children":[{"id":1395,"o":198709,"text":" Konfiguration der Cloud-Umgebung in KasperskyÂ&nbsp;SecurityÂ&nbsp;Center WebÂ&nbsp;Console ","url":"198709.htm","node":"4+23+0","children":[{"id":1396,"o":241277,"text":" Schritt 1. ÃœberprÃ¼fen der erforderlichen Plug-ins und Installationspakete ","url":"241277.htm","node":"4+23+0+0","leaf":true},{"id":1397,"o":198782,"text":" Schritt 2. Lizenzieren des Programms ","url":"198782.htm","node":"4+23+0+1","leaf":true},{"id":1398,"o":198733,"text":" Schritt 3. AuswÃ¤hlen der Cloud-Umgebung und Autorisierung ","url":"198733.htm","node":"4+23+0+2","leaf":true},{"id":1399,"o":198743,"text":" Schritt 4. Abfragen des Segments, Konfigurieren der Cloud-Synchronisation und WÃ¤hlen weiterer MaÃŸnahmen ","url":"198743.htm","node":"4+23+0+3","leaf":true},{"id":1400,"o":241303,"text":" Schritt 5. AuswÃ¤hlen der Anwendung, fÃ¼r die eine Richtlinie und Aufgaben erstellt werden sollen ","url":"241303.htm","node":"4+23+0+4","leaf":true},{"id":1401,"o":198783,"text":" Schritt 6. Konfiguration von Kaspersky Security Network fÃ¼r Kaspersky Security Center ","url":"198783.htm","node":"4+23+0+5","leaf":true},{"id":1402,"o":198789,"text":" Schritt 7. Erstellen einer Erstkonfiguration des Schutzes ","url":"198789.htm","node":"4+23+0+6","leaf":true}]},{"id":1403,"o":198852,"text":" Abfrage von Netzwerksegmenten mittels Kaspersky Security Center Web Console ","url":"198852.htm","node":"4+23+1","children":[{"id":1404,"o":198846,"text":" HinzufÃ¼gen von Verbindungen fÃ¼r die Abfrage von Cloud-Segmenten ","url":"198846.htm","node":"4+23+1+0","leaf":true},{"id":1405,"o":198901,"text":" Entfernen einer Verbindung fÃ¼r die Abfrage von Cloud-Segmenten ","url":"198901.htm","node":"4+23+1+1","leaf":true},{"id":1406,"o":198848,"text":" Konfiguration des Abfragezeitplans durch Kaspersky Security Center Web Console anpassen ","url":"198848.htm","node":"4+23+1+2","leaf":true},{"id":1407,"o":199091,"text":" Anzeigen der Ergebnisse der Abfrage des Cloud-Segments durch Kaspersky Security Center Web Console ","url":"199091.htm","node":"4+23+1+3","leaf":true},{"id":1408,"o":200119,"text":" Anzeigen der Eigenschaften von Cloud-GerÃ¤ten durch Kaspersky Security Center Web Console ","url":"200119.htm","node":"4+23+1+4","leaf":true}]},{"id":1409,"o":199139,"text":" Synchronisation mit der Cloud: Konfigurieren der Verschiebungsregel ","url":"199139.htm","node":"4+23+2","leaf":true},{"id":1410,"o":218327,"text":" Remote-Installation von Programmen auf virtuellen Maschinen von Azure ","url":"218327.htm","node":"4+23+3","leaf":true},{"id":1411,"o":199299,"text":" Erstellen der Aufgabe zum Backup der Daten des Administrationsservers unter Verwendung eines Cloud-DBMS ","url":"199299.htm","node":"4+23+4","leaf":true}]},{"id":1412,"o":197041,"text":" Ferndiagnose der Client-GerÃ¤te ","url":"197041.htm","node":"4+24","children":[{"id":1413,"o":197042,"text":" Ã–ffnen des Fensters fÃ¼r die Ferndiagnose ","url":"197042.htm","node":"4+24+0","leaf":true},{"id":1414,"o":197056,"text":" Aktivieren und Deaktivieren der Ablaufverfolgung fÃ¼r Programme ","url":"197056.htm","node":"4+24+1","leaf":true},{"id":1415,"o":197112,"text":" Herunterladen der Protokolldateien eines Programms ","url":"197112.htm","node":"4+24+2","leaf":true},{"id":1416,"o":198282,"text":" LÃ¶schen der Protokolldateien ","url":"198282.htm","node":"4+24+3","leaf":true},{"id":1417,"o":197067,"text":" Anwendungseinstellungen herunterladen ","url":"197067.htm","node":"4+24+4","leaf":true},{"id":1418,"o":197068,"text":" Ereignisprotokolle downloaden ","url":"197068.htm","node":"4+24+5","leaf":true},{"id":1419,"o":197117,"text":" Starten, Stoppen und Neustarten der Anwendung ","url":"197117.htm","node":"4+24+6","leaf":true},{"id":1420,"o":197886,"text":" Remote-Diagnose fÃ¼r den KasperskyÂ&nbsp;SecurityÂ&nbsp;Center Administrationsagenten ausfÃ¼hren und Ergebnisse herunterladen ","url":"197886.htm","node":"4+24+7","leaf":true},{"id":1421,"o":198283,"text":" AusfÃ¼hren eines Programms auf einem Client-GerÃ¤t ","url":"198283.htm","node":"4+24+8","leaf":true},{"id":1422,"o":249403,"text":" Erzeugen einer Dump-Datei fÃ¼r eine Anwendung ","url":"249403.htm","node":"4+24+9","leaf":true},{"id":1423,"o":257310,"text":" Ferndiagnose auf einem Linux-basierten Client-GerÃ¤t ausfÃ¼hren ","url":"257310.htm","node":"4+24+10","leaf":true},{"id":1424,"o":224975,"text":" Dateien aus QuarantÃ¤ne und Backup herunterladen und lÃ¶schen ","url":"224975.htm","node":"4+24+11","children":[{"id":1425,"o":224973,"text":" Dateien aus QuarantÃ¤ne und Backup herunterladen ","url":"224973.htm","node":"4+24+11+0","leaf":true},{"id":1426,"o":224974,"text":" Ãœber das Entfernen von Objekten aus den Datenverwaltungen der QuarantÃ¤ne, des Backups oder der aktiven Bedrohungen ","url":"224974.htm","node":"4+24+11+1","leaf":true}]}]},{"id":1427,"o":256056,"text":" Sprache der BenutzeroberflÃ¤che von KasperskyÂ&nbsp;SecurityÂ&nbsp;Center WebÂ&nbsp;Console Ã¤ndern ","url":"256056.htm","node":"4+25","leaf":true}]},{"id":1428,"o":211453,"text":" API-Referenzhandbuch ","url":"211453.htm","node":"5","leaf":true},{"id":1429,"o":155352,"text":" BewÃ¤hrte Verfahren fÃ¼r Dienstanbieter ","url":"155352.htm","node":"6","children":[{"id":1430,"o":155203,"text":" Planung der Bereitstellung fÃ¼r Kaspersky Security Center ","url":"155203.htm","node":"6+0","children":[{"id":1431,"o":155208,"text":" Internetzugriff fÃ¼r den Administrationsserver bereitstellen ","url":"155208.htm","node":"6+0+0","leaf":true},{"id":1432,"o":155207,"text":" Typische Konfiguration von Kaspersky Security Center ","url":"155207.htm","node":"6+0+1","leaf":true},{"id":1433,"o":155206,"text":" Ãœber Verteilungspunkte ","url":"155206.htm","node":"6+0+2","leaf":true},{"id":1434,"o":155205,"text":" Hierarchie des Administrationsservers ","url":"155205_1.htm","node":"6+0+3","leaf":true},{"id":1435,"o":155204,"text":" Virtuelle Administrationsserver ","url":"155204.htm","node":"6+0+4","leaf":true},{"id":1436,"o":92393,"text":" Mobile GerÃ¤te mit installiertem Kaspersky Endpoint Security fÃ¼r Android verwalten ","url":"92393_2.htm","node":"6+0+5","leaf":true}]},{"id":1437,"o":155178,"text":" Bereitstellung und Erstkonfiguration ","url":"155178.htm","node":"6+1","children":[{"id":1438,"o":92398,"text":" Installationsempfehlungen fÃ¼r den Administrationsserver ","url":"92398_1.htm","node":"6+1+0","children":[{"id":1439,"o":92400,"text":" Benutzerkonten fÃ¼r die Dienste des Administrationsservers auf dem Failover-Cluster erstellen ","url":"92400_1.htm","node":"6+1+0+0","leaf":true},{"id":1440,"o":92403,"text":" Auswahl des DBMS ","url":"92403.htm","node":"6+1+0+1","leaf":true},{"id":1441,"o":155202,"text":" Adresse des Administrationsservers angeben ","url":"155202.htm","node":"6+1+0+2","leaf":true}]},{"id":1442,"o":92417,"text":" Schutz im Netzwerk eines Kundenunternehmens anpassen ","url":"92417.htm","node":"6+1+1","children":[{"id":1443,"o":92418,"text":" Richtlinie fÃ¼r Kaspersky Endpoint Security manuell konfigurieren ","url":"92418_1.htm","node":"6+1+1+0","children":[{"id":1444,"o":175185,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Erweiterter Schutz&amp;quot; ","url":"175185_1.htm","node":"6+1+1+0+0","leaf":true},{"id":1445,"o":92419,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Basisschutz&amp;quot; ","url":"92419_1.htm","node":"6+1+1+0+1","leaf":true},{"id":1446,"o":155200,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Allgemeine Einstellungen&amp;quot; ","url":"155200.htm","node":"6+1+1+0+2","leaf":true},{"id":1447,"o":92424,"text":" Einstellungen der Richtlinie im Abschnitt &amp;quot;Konfiguration von Ereignissen&amp;quot; ","url":"92424_1.htm","node":"6+1+1+0+3","leaf":true}]},{"id":1448,"o":155199,"text":" Gruppenaufgabe zum Aktualisieren von Kaspersky Endpoint Security manuell konfigurieren ","url":"155199.htm","node":"6+1+1+1","leaf":true},{"id":1449,"o":92426,"text":" Manuelle Konfiguration der Gruppenaufgabe zur Untersuchung des GerÃ¤ts durch Kaspersky Endpoint Security ","url":"92426_1.htm","node":"6+1+1+2","leaf":true},{"id":1450,"o":92427,"text":" Aufgabe &amp;quot;Suche nach Schwachstellen und erforderlichen Updates&amp;quot; planen ","url":"92427_1.htm","node":"6+1+1+3","leaf":true},{"id":1451,"o":92428,"text":" Manuelle Konfiguration der Gruppenaufgabe zur Installation von Updates und zum SchlieÃŸen von Schwachstellen ","url":"92428_1.htm","node":"6+1+1+4","leaf":true},{"id":1452,"o":155198,"text":" Aufbau der Struktur von Administrationsgruppen und Zuweisung von Verteilungspunkten ","url":"155198.htm","node":"6+1+1+5","children":[{"id":1453,"o":155197,"text":" Typische Konfiguration des MSP-Kunden: EinzelbÃ¼ro ","url":"155197.htm","node":"6+1+1+5+0","leaf":true},{"id":1454,"o":155196,"text":" Typische Konfiguration des MSP-Kunden: Mehrere kleine, eigenstÃ¤ndige BÃ¼ros ","url":"155196.htm","node":"6+1+1+5+1","leaf":true}]},{"id":1455,"o":92432,"text":" Richtlinienhierarchie, Verwendung von Richtlinienprofilen ","url":"92432_1.htm","node":"6+1+1+6","children":[{"id":1456,"o":92433,"text":" Hierarchie der Richtlinien ","url":"92433_1.htm","node":"6+1+1+6+0","leaf":true},{"id":1457,"o":92434,"text":" Richtlinienprofile ","url":"92434_1.htm","node":"6+1+1+6+1","leaf":true}]},{"id":1458,"o":92435,"text":" Aufgaben ","url":"92435_1.htm","node":"6+1+1+7","leaf":true},{"id":1459,"o":155195,"text":" Verschiebungsregeln fÃ¼r GerÃ¤te ","url":"155195.htm","node":"6+1+1+8","leaf":true},{"id":1460,"o":92438,"text":" Software-Kategorisierung ","url":"92438_1.htm","node":"6+1+1+9","leaf":true},{"id":1461,"o":184784,"text":" MandantenfÃ¤hige Programme ","url":"184784.htm","node":"6+1+1+10","leaf":true}]},{"id":1462,"o":92439,"text":" Verschieben ins Backup und Wiederherstellen der Einstellungen des Administrationsservers ","url":"92439_1.htm","node":"6+1+2","children":[{"id":1463,"o":92442,"text":" Ein GerÃ¤t mit dem Administrationsserver ist ausgefallen ","url":"92442_1.htm","node":"6+1+2+0","leaf":true},{"id":1464,"o":92443,"text":" Die Einstellungen des Administrationsservers oder der Datenbank sind beschÃ¤digt ","url":"92443_1.htm","node":"6+1+2+1","leaf":true}]},{"id":1465,"o":92444,"text":" Softwareverteilung fÃ¼r den Administrationsagenten und die Sicherheitsanwendung ","url":"92444_1.htm","node":"6+1+3","children":[{"id":1466,"o":155194,"text":" Erstmalige Bereitstellung ","url":"155194.htm","node":"6+1+3+0","children":[{"id":1467,"o":155193,"text":" Anpassen der Einstellungen der Installer ","url":"155193.htm","node":"6+1+3+0+0","leaf":true},{"id":1468,"o":155192,"text":" Installationspakete ","url":"155192.htm","node":"6+1+3+0+1","leaf":true},{"id":1469,"o":155191,"text":" Eigenschaften des MSI-Installers und der Transformationsdateien ","url":"155191.htm","node":"6+1+3+0+2","leaf":true},{"id":1470,"o":155190,"text":" Bereitstellung mithilfe von Drittanbieter-Tools zur Remote-Installation von Apps ","url":"155190.htm","node":"6+1+3+0+3","leaf":true},{"id":1471,"o":155189,"text":" Allgemeinen Angaben Ã¼ber die Aufgaben zur Remote-Installation der Apps von Kaspersky Security Center ","url":"155189.htm","node":"6+1+3+0+4","leaf":true},{"id":1472,"o":155188,"text":" Bereitstellung mithilfe des Mechanismus der Gruppenrichtlinien von Microsoft Windows ","url":"155188.htm","node":"6+1+3+0+5","leaf":true},{"id":1473,"o":155187,"text":" Erzwungene Bereitstellung mithilfe der Aufgabe zur Remote-Installation der Apps von Kaspersky Security Center ","url":"155187.htm","node":"6+1+3+0+6","leaf":true},{"id":1474,"o":155186,"text":" Start der von Kaspersky Security Center gebildeten autonomen Pakete ","url":"155186.htm","node":"6+1+3+0+7","leaf":true},{"id":1475,"o":155185,"text":" Funktion zur manuellen Installation von Apps ","url":"155185.htm","node":"6+1+3+0+8","leaf":true}]},{"id":1476,"o":155239,"text":" Remote-Installation von Apps auf GerÃ¤te mit installiertem Administrationsagenten ","url":"155239.htm","node":"6+1+3+1","leaf":true},{"id":1477,"o":92466,"text":" Verwaltung des Neustarts von GerÃ¤ten in der Aufgabe zur Remote-Installation ","url":"92466_1.htm","node":"6+1+3+2","leaf":true},{"id":1478,"o":155184,"text":" Zweckdienlichkeit des Datenbanken-Updates im Installationspaket der Antiviren-App ","url":"155184.htm","node":"6+1+3+3","leaf":true},{"id":1479,"o":92468,"text":" Entfernen der inkompatiblen Sicherheitsanwendungen von Drittanbietern ","url":"92468.htm","node":"6+1+3+4","leaf":true},{"id":1480,"o":283534,"text":" Einen kennwortgeschÃ¼tzten Administrationsagenten Ã¼ber die Eingabeaufforderung entfernen ","url":"283534.htm","node":"6+1+3+5","leaf":true},{"id":1481,"o":92470,"text":" Verwendung von Tools zur Remote-Installation der Apps von Kaspersky Security Center fÃ¼r den Start von beliebigen ausfÃ¼hrbaren Dateien auf den verwalteten GerÃ¤ten ","url":"92470_1.htm","node":"6+1+3+6","leaf":true},{"id":1482,"o":155183,"text":" Monitoring der Bereitstellung ","url":"155183.htm","node":"6+1+3+7","leaf":true},{"id":1483,"o":92472,"text":" Anpassen der Einstellungen der Installer ","url":"92472_1.htm","node":"6+1+3+8","children":[{"id":1484,"o":92473,"text":" Allgemeine Informationen ","url":"92473_1.htm","node":"6+1+3+8+0","leaf":true},{"id":1485,"o":92474,"text":" Installation im Silent-Modus (mit Antwortdatei) ","url":"92474_1.htm","node":"6+1+3+8+1","leaf":true},{"id":1486,"o":92475,"text":" Installation des Administrationsagenten im Silent-Modus (ohne Antwortdatei) ","url":"92475_1.htm","node":"6+1+3+8+2","leaf":true},{"id":1487,"o":92476,"text":" Teilweises Anpassen der Installationseinstellungen durch setup.exe ","url":"92476_1.htm","node":"6+1+3+8+3","leaf":true},{"id":1488,"o":155247,"text":" Installationseinstellungen fÃ¼r den Administrationsserver ","url":"155247.htm","node":"6+1+3+8+4","leaf":true},{"id":1489,"o":155182,"text":" Installationseinstellungen des Administrationsagenten ","url":"155182.htm","node":"6+1+3+8+5","leaf":true}]},{"id":1490,"o":92479,"text":" Virtuelle Infrastruktur ","url":"92479_1.htm","node":"6+1+3+9","children":[{"id":1491,"o":92480,"text":" Empfehlungen zur Senkung der Belastung auf den virtuellen Maschinen ","url":"92480_1.htm","node":"6+1+3+9+0","leaf":true},{"id":1492,"o":92481,"text":" UnterstÃ¼tzung von dynamischen virtuellen Maschinen ","url":"92481_1.htm","node":"6+1+3+9+1","leaf":true},{"id":1493,"o":92482,"text":" UnterstÃ¼tzung des Kopierens von virtuellen Maschinen ","url":"92482_1.htm","node":"6+1+3+9+2","leaf":true}]},{"id":1494,"o":92483,"text":" UnterstÃ¼tzung des Rollbacks des Dateisystems fÃ¼r GerÃ¤te mit Administrationsagent ","url":"92483_1.htm","node":"6+1+3+10","leaf":true}]},{"id":1495,"o":92485,"text":" Ãœber Verbindungsprofile fÃ¼r mobile Benutzer ","url":"92485_1.htm","node":"6+1+4","leaf":true},{"id":1496,"o":92510,"text":" Bereitstellung der FunktionalitÃ¤t &amp;quot;Verwaltung mobiler GerÃ¤te&amp;quot; ","url":"92510.htm","node":"6+1+5","children":[{"id":1497,"o":92520,"text":" Verbindung von KES-GerÃ¤ten mit dem Administrationsserver ","url":"92520_1.htm","node":"6+1+5+0","children":[{"id":1498,"o":155251,"text":" Direkte Verbindung der GerÃ¤te mit dem Administrationsserver ","url":"155251.htm","node":"6+1+5+0+0","leaf":true},{"id":1499,"o":92523,"text":" Anschlussschema fÃ¼r KES-GerÃ¤te mit dem Server unter Verwendung der erzwungenen Delegierung Kerberos (KCD) ","url":"92523_1.htm","node":"6+1+5+0+1","leaf":true},{"id":1500,"o":92525,"text":" Verwendung von FirebaseÂ&nbsp;CloudÂ&nbsp;Messaging ","url":"92525_1.htm","node":"6+1+5+0+2","leaf":true}]},{"id":1501,"o":92526,"text":" Integration in die Public-Key-Infrastruktur ","url":"92526_1.htm","node":"6+1+5+1","leaf":true},{"id":1502,"o":155181,"text":" Kaspersky Security Center Webserver ","url":"155181.htm","node":"6+1+5+2","leaf":true}]}]},{"id":1503,"o":92535,"text":" Weitere Routinearbeiten ","url":"92535_1.htm","node":"6+2","children":[{"id":1504,"o":92536,"text":" Farbliche Kennzeichnungen und protokollierte Ereignissen in der Verwaltungskonsole Ã¼berwachen ","url":"92536_1.htm","node":"6+2+0","leaf":true},{"id":1505,"o":92537,"text":" Remote-Zugriff auf verwaltete GerÃ¤te ","url":"92537.htm","node":"6+2+1","children":[{"id":1506,"o":155179,"text":" Verwenden der Option &amp;quot;Verbindung mit Administrationsserver nicht trennen&amp;quot; zur Bereitstellung einer dauerhaften Verbindung zwischen einem verwalteten GerÃ¤t und dem Administrationsserver ","url":"155179.htm","node":"6+2+1+0","leaf":true},{"id":1507,"o":92539,"text":" Ãœber das ÃœberprÃ¼fen der Verbindungszeit des GerÃ¤ts mit dem Administrationsserver ","url":"92539_1.htm","node":"6+2+1+1","leaf":true},{"id":1508,"o":92540,"text":" Ãœber erzwungene Synchronisierung ","url":"92540_1.htm","node":"6+2+1+2","leaf":true},{"id":1509,"o":92541,"text":" Ãœber das Tunneln von Verbindungen ","url":"92541.htm","node":"6+2+1+3","leaf":true}]}]}]},{"id":1510,"o":162088,"text":" Handbuch zur Skalierung ","url":"162088.htm","node":"7","children":[{"id":1511,"o":148071,"text":" Zu diesem Handbuch ","url":"148071.htm","node":"7+0","leaf":true},{"id":1512,"o":159736,"text":" Informationen zu EinschrÃ¤nkungen von Kaspersky Security Center ","url":"159736_1.htm","node":"7+1","leaf":true},{"id":1513,"o":159711,"text":" Berechnungen fÃ¼r die Administrationsserver ","url":"159711.htm","node":"7+2","children":[{"id":1514,"o":154137,"text":" Berechnung von Hardwareressourcen fÃ¼r den Administrationsserver ","url":"154137.htm","node":"7+2+0","children":[{"id":1515,"o":92567,"text":" Hardwarevoraussetzungen fÃ¼r DBMS und Administrationsserver ","url":"92567.htm","node":"7+2+0+0","leaf":true},{"id":1516,"o":159941,"text":" Berechnung des Speicherplatzes in der Datenbank ","url":"159941.htm","node":"7+2+0+1","leaf":true},{"id":1517,"o":159969,"text":" Berechnung des Speicherplatzes auf dem Laufwerk (mit und ohne BerÃ¼cksichtigung der Verwendung von Schwachstellen- und Patch-Management) ","url":"159969.htm","node":"7+2+0+2","leaf":true}]},{"id":1518,"o":154138,"text":" Berechnung der Anzahl und der Konfiguration der Administrationsserver ","url":"154138.htm","node":"7+2+1","leaf":true},{"id":1519,"o":240907,"text":" Empfehlungen fÃ¼r die Verbindung dynamischer virtueller Maschinen mit Kaspersky Security Center ","url":"240907.htm","node":"7+2+2","leaf":true}]},{"id":1520,"o":158510,"text":" Berechnungen fÃ¼r Verteilungspunkte und Verbindungs-Gateways ","url":"158510.htm","node":"7+3","children":[{"id":1521,"o":92569,"text":" Voraussetzungen fÃ¼r Verteilungspunkte ","url":"92569.htm","node":"7+3+0","leaf":true},{"id":1522,"o":154282,"text":" Anzahl und Konfiguration der Verteilungspunkte bestimmen ","url":"154282_1.htm","node":"7+3+1","leaf":true},{"id":1523,"o":158936,"text":" Berechnung der Anzahl der Verbindungs-Gateways ","url":"158936.htm","node":"7+3+2","leaf":true}]},{"id":1524,"o":159815,"text":" Speicherung der Daten zu Ereignissen fÃ¼r Aufgaben und Richtlinien ","url":"159815.htm","node":"7+4","leaf":true},{"id":1525,"o":154142,"text":" Besonderheiten und optimale Einstellungen bestimmter Aufgaben ","url":"154142.htm","node":"7+5","children":[{"id":1526,"o":159708,"text":" HÃ¤ufigkeit der GerÃ¤tesuche ","url":"159708.htm","node":"7+5+0","leaf":true},{"id":1527,"o":159041,"text":" Aufgabe zum Anlegen eines Daten-Backups des Administrationsservers und zur Wartung des Administrationsservers ","url":"159041.htm","node":"7+5+1","leaf":true},{"id":1528,"o":159206,"text":" Gruppenaufgaben zum Update von Kaspersky Endpoint Security ","url":"159206.htm","node":"7+5+2","leaf":true},{"id":1529,"o":154160,"text":" Inventarisierungsaufgabe ","url":"154160.htm","node":"7+5+3","leaf":true}]},{"id":1530,"o":154280,"text":" Informationen zur Netzwerkauslastung zwischen dem Administrationsserver und den geschÃ¼tzten GerÃ¤ten ","url":"154280.htm","node":"7+6","children":[{"id":1531,"o":159734,"text":" Verbrauch von Datenverkehr bei der AusfÃ¼hrung verschiedener Szenarien ","url":"159734.htm","node":"7+6+0","leaf":true},{"id":1532,"o":159735,"text":" Mittleren Verbrauch von Datenverkehr in 24 Stunden ","url":"159735.htm","node":"7+6+1","leaf":true}]}]},{"id":1533,"o":243091,"text":" Anfragen an den Technischen Support ","url":"241127.htm","node":"8","children":[{"id":1534,"o":111618,"text":" So erhalten Sie technischen Support ","url":"68247.htm","node":"8+0","leaf":true},{"id":1535,"o":111620,"text":" Technischer Support mit KasperskyÂ&nbsp;CompanyAccount ","url":"68417.htm","node":"8+1","leaf":true},{"id":1536,"o":274056,"text":" Dump-Dateien des Administrationsservers abrufen ","url":"274056.htm","node":"8+2","leaf":true}]},{"id":1537,"o":166360,"text":" Weitere Informationsquellen zu dieser Anwendung ","url":"166360.htm","node":"9","leaf":true},{"id":1538,"o":95897,"text":" Glossar ","url":"95897.htm","node":"10","children":[{"id":1606,"o":111592,"text":"Administrationsagent","url":"95897.htm#o111592","node":"10+67","leaf":true},{"id":1542,"o":112575,"text":"Administrationsgruppe","url":"95897.htm#o112575","node":"10+3","leaf":true},{"id":1543,"o":112576,"text":"Administrationsserver","url":"95897.htm#o112576","node":"10+4","leaf":true},{"id":1545,"o":112580,"text":"Administrationsserver-Client (Client-GerÃ¤t) ","url":"95897.htm#o112580","node":"10+6","leaf":true},{"id":1617,"o":167765,"text":"Administrator des Anbieters","url":"95897.htm#o167765","node":"10+78","leaf":true},{"id":1589,"o":112568,"text":"Administrator von Kaspersky Security Center","url":"95897.htm#o112568","node":"10+50","leaf":true},{"id":1548,"o":112590,"text":"Administrator-Arbeitsplatz","url":"95897.htm#o112590","node":"10+9","leaf":true},{"id":1547,"o":167763,"text":"Administratorberechtigungen","url":"95897.htm#o167763","node":"10+8","leaf":true},{"id":1539,"o":111595,"text":"Aktiver SchlÃ¼ssel","url":"95897.htm#o111595","node":"10+0","leaf":true},{"id":1549,"o":167778,"text":"Amazon EC2-Instance","url":"95897.htm#o167778","node":"10+10","leaf":true},{"id":1550,"o":167785,"text":"Amazon Machine Image (AMI)","url":"95897.htm#o167785","node":"10+11","leaf":true},{"id":1552,"o":167787,"text":"Anbieter von Antiviren-Schutz","url":"95897.htm#o167787","node":"10+13","leaf":true},{"id":1551,"o":111582,"text":"Antiviren-Datenbanken","url":"95897.htm#o111582","node":"10+12","leaf":true},{"id":1553,"o":167783,"text":"App Store","url":"95897.htm#o167783","node":"10+14","leaf":true},{"id":1620,"o":112579,"text":"Aufgabe","url":"95897.htm#o112579","node":"10+81","leaf":true},{"id":1621,"o":112571,"text":"Aufgabe fÃ¼r eine Reihe von GerÃ¤ten","url":"95897.htm#o112571","node":"10+82","leaf":true},{"id":1622,"o":112586,"text":"Aufgabeneinstellungen","url":"95897.htm#o112586","node":"10+83","leaf":true},{"id":1554,"o":167761,"text":"Authentifizierungsagent","url":"95897.htm#o167761","node":"10+15","leaf":true},{"id":1556,"o":167744,"text":"AWS Application Program Interface (AWS API)","url":"95897.htm#o167744","node":"10+17","leaf":true},{"id":1557,"o":167779,"text":"AWS IAM-ZugriffsschlÃ¼ssel","url":"95897.htm#o167779","node":"10+18","leaf":true},{"id":1558,"o":167780,"text":"AWS-Managementkonsole","url":"95897.htm#o167780","node":"10+19","leaf":true},{"id":1559,"o":112600,"text":"Backup-Ordner","url":"95897.htm#o112600","node":"10+20","leaf":true},{"id":1560,"o":167806,"text":"Broadcast-DomÃ¤ne","url":"95897.htm#o167806","node":"10+21","leaf":true},{"id":1562,"o":167764,"text":"Client-Administrator","url":"95897.htm#o167764","node":"10+23","leaf":true},{"id":1563,"o":273649,"text":"Cloud Discovery","url":"95897.htm#o273649","node":"10+24","leaf":true},{"id":1564,"o":167784,"text":"Cloud-Umgebung","url":"95897.htm#o167784","node":"10+25","leaf":true},{"id":1546,"o":112591,"text":"Daten-Backup des Administrationsservers ","url":"95897.htm#o112591","node":"10+7","leaf":true},{"id":1567,"o":167774,"text":"Demilitarisierte Zone (DMZ)","url":"95897.htm#o167774","node":"10+28","leaf":true},{"id":1569,"o":112583,"text":"Direkte Anwendungsverwaltung","url":"95897.htm#o112583","node":"10+30","leaf":true},{"id":1571,"o":181186,"text":"Ereignis-Datenverwaltung","url":"95897.htm#o181186","node":"10+32","leaf":true},{"id":1609,"o":167802,"text":"Ereigniskategorie des Patches","url":"95897.htm#o167802","node":"10+70","leaf":true},{"id":1573,"o":112599,"text":"Erzwungene Installation","url":"95897.htm#o112599","node":"10+34","leaf":true},{"id":1623,"o":167803,"text":"GerÃ¤t mit Schutz auf UEFI-Ebene","url":"95897.htm#o167803","node":"10+84","leaf":true},{"id":1568,"o":167771,"text":"GerÃ¤tebesitzer","url":"95897.htm#o167771","node":"10+29","leaf":true},{"id":1618,"o":167786,"text":"Geteiltes Zertifikat","url":"95897.htm#o167786","node":"10+79","leaf":true},{"id":1627,"o":112589,"text":"Grenzwert fÃ¼r VirenaktivitÃ¤t","url":"95897.htm#o112589","node":"10+88","leaf":true},{"id":1574,"o":112572,"text":"Gruppenaufgabe","url":"95897.htm#o112572","node":"10+35","leaf":true},{"id":1597,"o":111588,"text":"GÃ¼ltigkeitsdauer der Lizenz","url":"95897.htm#o111588","node":"10+58","leaf":true},{"id":1575,"o":287724,"text":"HÃ¤rtungsleitfaden","url":"95897.htm#o287724","node":"10+36","leaf":true},{"id":1576,"o":167775,"text":"Home-Administrationsserver","url":"95897.htm#o167775","node":"10+37","leaf":true},{"id":1577,"o":167748,"text":"HTTPS","url":"95897.htm#o167748","node":"10+38","leaf":true},{"id":1579,"o":167749,"text":"IAM-Benutzer","url":"95897.htm#o167749","node":"10+40","leaf":true},{"id":1578,"o":167750,"text":"IAM-Rolle","url":"95897.htm#o167750","node":"10+39","leaf":true},{"id":1580,"o":167751,"text":"IdentitÃ¤ts- und Zugriffsverwaltung (IAM)","url":"95897.htm#o167751","node":"10+41","leaf":true},{"id":1581,"o":112595,"text":"Inkompatibles Programm","url":"95897.htm#o112595","node":"10+42","leaf":true},{"id":1582,"o":111583,"text":"Installationspaket","url":"95897.htm#o111583","node":"10+43","leaf":true},{"id":1583,"o":111597,"text":"Interne Benutzer","url":"95897.htm#o111597","node":"10+44","leaf":true},{"id":1584,"o":167753,"text":"iOSÂ&nbsp;MDM-GerÃ¤t","url":"95897.htm#o167753","node":"10+45","leaf":true},{"id":1585,"o":167752,"text":"iOS MDM-Profil","url":"95897.htm#o167752","node":"10+46","leaf":true},{"id":1586,"o":167797,"text":"iOS MDM-Server","url":"95897.htm#o167797","node":"10+47","leaf":true},{"id":1587,"o":167754,"text":"JavaScript","url":"95897.htm#o167754","node":"10+48","leaf":true},{"id":1588,"o":179656,"text":"Kaspersky Private Security Network (KPSN)","url":"95897.htm#o179656","node":"10+49","leaf":true},{"id":1590,"o":112585,"text":"Kaspersky Security Center Operator","url":"95897.htm#o112585","node":"10+51","leaf":true},{"id":1591,"o":167755,"text":"Kaspersky Security Center System Health Validator (SHV)","url":"95897.htm#o167755","node":"10+52","leaf":true},{"id":1592,"o":167770,"text":"Kaspersky Security Center Webserver","url":"95897.htm#o167770","node":"10+53","leaf":true},{"id":1593,"o":111589,"text":"KasperskyÂ&nbsp;SecurityÂ&nbsp;Network (KSN)","url":"95897.htm#o111589","node":"10+54","leaf":true},{"id":1594,"o":111587,"text":"Kaspersky-Update-Server","url":"95897.htm#o111587","node":"10+55","leaf":true},{"id":1595,"o":167756,"text":"KES-GerÃ¤t","url":"95897.htm#o167756","node":"10+56","leaf":true},{"id":1565,"o":167781,"text":"Konfigurationsprofil","url":"95897.htm#o167781","node":"10+26","leaf":true},{"id":1598,"o":167772,"text":"Lizenzierte Anwendungsgruppe","url":"95897.htm#o167772","node":"10+59","leaf":true},{"id":1600,"o":112582,"text":"Lokale Aufgabe","url":"95897.htm#o112582","node":"10+61","leaf":true},{"id":1599,"o":167782,"text":"Lokale Installation","url":"95897.htm#o167782","node":"10+60","leaf":true},{"id":1603,"o":167795,"text":"Manuelle Installation","url":"95897.htm#o167795","node":"10+64","leaf":true},{"id":1604,"o":255615,"text":"MITM-Angriff","url":"95897.htm#o255615","node":"10+65","leaf":true},{"id":1607,"o":167768,"text":"Netzwerk-Antiviren-Schutz","url":"95897.htm#o167768","node":"10+68","leaf":true},{"id":1608,"o":167800,"text":"Netzwerk-Schutzstatus","url":"95897.htm#o167800","node":"10+69","leaf":true},{"id":1611,"o":112587,"text":"Programmeinstellungen","url":"95897.htm#o112587","node":"10+72","leaf":true},{"id":1613,"o":167758,"text":"Provisioning-Profil","url":"95897.htm#o167758","node":"10+74","leaf":true},{"id":1614,"o":112596,"text":"Remote-Installation","url":"95897.htm#o112596","node":"10+75","leaf":true},{"id":1610,"o":111585,"text":"Richtlinie","url":"95897.htm#o111585","node":"10+71","leaf":true},{"id":1596,"o":167804,"text":"SchlÃ¼sseldatei","url":"95897.htm#o167804","node":"10+57","leaf":true},{"id":1612,"o":112594,"text":"Schutzstatus","url":"95897.htm#o112594","node":"10+73","leaf":true},{"id":1629,"o":112677,"text":"Schwachstelle","url":"95897.htm#o112677","node":"10+90","leaf":true},{"id":1605,"o":167798,"text":"Server fÃ¼r mobile GerÃ¤te","url":"95897.htm#o167798","node":"10+66","leaf":true},{"id":1572,"o":112597,"text":"Signifikanz des Ereignisses","url":"95897.htm#o112597","node":"10+33","leaf":true},{"id":1619,"o":167759,"text":"SSL","url":"95897.htm#o167759","node":"10+80","leaf":true},{"id":1624,"o":112584,"text":"Update","url":"95897.htm#o112584","node":"10+85","leaf":true},{"id":1625,"o":287741,"text":"Upgraden von KasperskyÂ&nbsp;SecurityÂ&nbsp;Center (Aktualisieren)","url":"95897.htm#o287741","node":"10+86","leaf":true},{"id":1566,"o":204456,"text":"Verbindungs-Gateway","url":"95897.htm#o204456","node":"10+27","leaf":true},{"id":1555,"o":112573,"text":"VerfÃ¼gbares Update","url":"95897.htm#o112573","node":"10+16","leaf":true},{"id":1570,"o":111581,"text":"Verteilungspunkt","url":"95897.htm#o111581","node":"10+31","leaf":true},{"id":1601,"o":167801,"text":"Verwaltete GerÃ¤te","url":"95897.htm#o167801","node":"10+62","leaf":true},{"id":1602,"o":112588,"text":"Verwaltungs-Plug-in","url":"95897.htm#o112588","node":"10+63","leaf":true},{"id":1541,"o":112581,"text":"Verwaltungskonsole","url":"95897.htm#o112581","node":"10+2","leaf":true},{"id":1628,"o":112612,"text":"Virenangriff","url":"95897.htm#o112612","node":"10+89","leaf":true},{"id":1626,"o":112610,"text":"Virtueller Administrationsserver","url":"95897.htm#o112610","node":"10+87","leaf":true},{"id":1615,"o":112577,"text":"Wiederherstellung","url":"95897.htm#o112577","node":"10+76","leaf":true},{"id":1616,"o":112578,"text":"Wiederherstellung der Daten des Administrationsservers","url":"95897.htm#o112578","node":"10+77","leaf":true},{"id":1630,"o":167760,"text":"Windows Server Update-Dienst (WSUS)","url":"95897.htm#o167760","node":"10+91","leaf":true},{"id":1561,"o":112601,"text":"Zentralisierte Anwendungsverwaltung","url":"95897.htm#o112601","node":"10+22","leaf":true},{"id":1544,"o":112593,"text":"Zertifikat des Administrationsservers","url":"95897.htm#o112593","node":"10+5","leaf":true},{"id":1540,"o":111599,"text":"ZusÃ¤tzlicher LizenzschlÃ¼ssel (oder Reserve-LizenzschlÃ¼ssel)","url":"95897.htm#o111599","node":"10+1","leaf":true}]},{"id":1631,"o":111621,"text":" Informationen Ã¼ber den Code von Drittanbietern ","url":"37531.htm","node":"11","leaf":true},{"id":1632,"o":49304,"text":" Markenrechtliche Hinweise ","url":"49304.htm","node":"12","leaf":true},{"id":1633,"o":211205,"text":" Bekannte Probleme ","url":"211205.htm","node":"13","leaf":true}]</pre></body></html>