About data provision

August 21, 2023

ID 167766

The program operates with the use of data whose transmission and processing requires the consent of the Kaspersky Security 8 for Linux Mail Server administrator.

You can view the list of data and the terms on which it is used as well as give consent to data processing in the following agreements between your organization and Kaspersky:

  • In the End User License Agreement.

    In accordance with the terms of the License Agreement that you have accepted, you consent to the automatic transmission to Kaspersky of information enumerated in the License Agreement under "Conditions regarding data processing". This information is necessary to improve the level of mail server security.

  • In the Privacy Policy.
  • In the Kaspersky Security Network Statement and the Supplementary Kaspersky Security Network Statement.

    In the course of participation in the Kaspersky Security Network and submission of KSN statistics to Kaspersky, information can be transmitted that was obtained as a result of the program's operation. The list of data that is transmitted is provided in the Kaspersky Security Network Statement and the Supplementary Kaspersky Security Network Statement.

Kaspersky protects any information received in this way as prescribed by law and applicable rules of Kaspersky. Data is transmitted over encrypted data links.

RAM of Kaspersky Security 8 for Linux Mail Server may contain any processed data of application users. The administrator of Kaspersky Security 8 for Linux Mail Server must personally ensure the security of such data.

The following table contains the complete list of user data that can be stored by Kaspersky Security 8 for Linux Mail Server.

User data that can be stored in Kaspersky Security 8 for Linux Mail Server

Section / subsection that uses the data

Data storage directory

Data type

Storage duration

Data protection measures

Reports and monitoring

 

/var/opt/kaspersky

 

Statistics on email messages:

  • Addresses of the sender and recipients.
  • Names of infected attachments.

    Information from email messages:

  • Sender's IP address.
  • Email addresses of the sender and recipients.
  • Message subject.
  • Message body.
  • Message control headers.
  • Attachments.

Indefinite.

 

By default, only the root super-user account of operating systems and the kluser user account of Kaspersky Security 8 for Linux Mail Server have access to personal data of users.

The kluser account is created during the installation of Kaspersky Security 8 for Linux Mail Server, and access rights of this account are limited in accordance with the most secure scenario of working with personal data.

The ability to limit access rights of administrators and other users of servers and operating systems that have Kaspersky Security 8 for Linux Mail Server installed using features of Kaspersky Security 8 for Linux Mail Server is not available.

The administrator of Kaspersky Security 8 for Linux Mail Server should use any system measures at the administrator's discretion to control access of administrators and other users of servers and operating systems that have Kaspersky Security 8 for Linux Mail Server installed to personal data of other users.

Trace log

/var/log/kaspersky

Information from email messages:

  • Sender's IP address.
  • Email addresses of the sender and recipients.
  • Message subject.
  • Message body.
  • Message control headers.
  • Attachments.

Accounts and IP addresses of program web interface users

Accounts of users on the LDAP server and in Active Directory.

Indefinite.

When 500 MB limit is reached, log rotation is initiated, and deletion of old records begins.

Event log and audit log

/var/opt/kaspersky

Indefinite.

When 1 million record limit is reached, log rotation is initiated, and deletion of old records begins.

Backup

/var/opt/kaspersky

Information from email messages:

  • Sender's IP address.
  • Email addresses of the sender and recipients.
  • Message subject.
  • Message body.
  • Message control headers.
  • Attachments.

Indefinite.

When size limit is reached, rotation is initiated, and deletion of old records begins.

The size limit is 1 GB by default.

Anti-Spam Quarantine

Indefinite.

When size limit is reached, rotation is initiated, and deletion of old records begins.

The size limit is 1 GB by default.

KATA Quarantine.

Indefinite.

When size limit is reached, rotation is initiated, and deletion of old records begins.

The size limit is 1 GB by default.

Temporary files

/tmp/klmstmp

/tmp/klms_filter

Until program restart.

Configuration files

/var/opt/kaspersky

/etc/opt/kaspersky

Program configuration files:

  • Black and white lists of email addresses.
  • Program and HelpDesk administrator accounts.

Accounts of users on the LDAP server and in Active Directory.

Indefinite.

Managing the program from the Kaspersky Security 8 for Linux Mail Server Management Console of the server on which Kaspersky Security 8 for Linux Mail Server is installed, using an account with super-user privileges, allows you to manage dump settings. A dump is generated whenever the program crashes and can be useful for analyzing the causes of the crash. The dump may include any data, including fragments of content of email messages and analyzed files.

By default, dump generation in Kaspersky Security 8 for Linux Mail Server is disabled.

Such data can be accessed from the Management Console of the server on which Kaspersky Security 8 for Linux Mail Server is installed, using an account with super-user privileges.

The administrator of Kaspersky Security 8 for Linux Mail Server must personally ensure the security of such data.

The administrator of Kaspersky Security 8 for Linux Mail Server is responsible for access to this information.

See also

Application licensing

About the End User License Agreement

About the license

About the license certificate

About the key

About the activation code

About the key file

About the subscription

Viewing information about the license and added keys

Viewing information about the license and added keys using the command line interface

Updating of license and added keys information

Adding a key file

Adding an activation code

Removing a key

Notifications that the license expires soon

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.