Kaspersky Security Center

Network Agent policy settings

May 3, 2024

ID 219894

Expand all | Collapse all

To configure the Network Agent policy:

  1. In the main menu, go to Assets (Devices)Policies & profiles.
  2. Click the name of the Network Agent policy.

    The properties window of the Network Agent policy opens. The properties window contains the tabs and settings described below.

Consider that for Linux and Windows-based devices, various settings are available.

General

On this tab, you can modify the policy name, policy status and specify the inheritance of policy settings:

  • In the Policy status block, you can select one of the following policy modes:
    • Active policy
    • Inactive policy
  • In the Settings inheritance settings group, you can configure the policy inheritance:
    • Inherit settings from parent policy
    • Force inheritance of settings in child policies

Event configuration

On this tab, you can configure event logging and event notification. Events are distributed according to importance level in the following sections:

  • Functional failure
  • Warning
  • Info

In each section, the list shows the types of events and the default event storage period on the Administration Server (in days). After you click the event type, you can specify the settings of event logging and notifications about events selected in the list. By default, common notification settings specified for the entire Administration Server are used for all event types. However, you can change specific settings for the required event types.

For example, in the Warning section, you can configure the Security issue has occurred event type. Such events may happen, for instance, when the free disk space of a distribution point is less than 2 GB (at least 4 GB are required to install applications and download updates remotely). To configure the Security issue has occurred event, click it and specify where to store the occurred events and how to notify about them.

If Network Agent detected a security issue, you can manage this issue by using the settings of a managed device.

Application settings

Settings

In the Settings section, you can configure the Network Agent policy:

  • Distribute files through distribution points only
  • Maximum size of event queue, in MB
  • Application is allowed to retrieve policy's extended data on device
  • Protect the Network Agent service against unauthorized removal or termination, and prevent changes to the settings
  • Use uninstallation password

Repositories

In the Repositories section, you can select the types of objects whose details will be sent from Network Agent to Administration Server. If modification of some settings in this section is prohibited by the Network Agent policy, you cannot modify these settings.

  • Details of installed applications
  • Hardware registry details

Connectivity

The Connectivity section includes three subsections:

  • Network
  • Connection profiles
  • Connection schedule

In the Network subsection, you can configure the connection to Administration Server, enable the use of a UDP port, and specify the UDP port number.

  • In the Connect to Administration Server settings group, you can configure connection to the Administration Server and specify the time interval for synchronization between client devices and the Administration Server:
    • Synchronization interval (min)
    • Compress network traffic
    • Open Network Agent ports in Microsoft Windows Firewall
    • Use SSL connection
    • Use connection gateway on distribution point (if available) under default connection settings
  • Use UDP port
  • UDP port number

In the Connection profiles subsection, you can specify the network location settings and enable out-of-office mode when Administration Server is not available. The settings in the Connection profiles section are available only on devices running Windows:

  • Network location settings
  • Administration Server connection profiles
  • Enable out-of-office mode when Administration Server is not available

In the Connection schedule subsection, you can specify the time intervals during which Network Agent sends data to the Administration Server:

  • Connect when necessary
  • Connect at specified time intervals

Network polling by distribution points

In the Network polling by distribution points section, you can configure automatic polling of the network. You can use the following options to enable the polling and set its frequency:

  • Zeroconf
  • IP ranges
  • Domain controllers

Network settings for distribution points

In the Network settings for distribution points section, you can specify the internet access settings:

  • Use proxy server
  • Address
  • Port number
  • Bypass proxy server for local addresses
  • Proxy server authentication
  • User name
  • Password

KSN Proxy (distribution points)

In the KSN Proxy (distribution points) section, you can configure the application to use the distribution point to forward Kaspersky Security Network (KSN) requests from the managed devices:

  • Enable KSN Proxy on the distribution point side
  • Forward KSN requests to Administration Server
  • Access KSN Cloud/KPSN directly over the internet
  • Port
  • UDP port

Updates (distribution points)

In the Updates (distribution points) section, you can enable the downloading diff files feature, so distribution points take updates in the form of diff files from Kaspersky update servers.

Restart management

In the Restart management section, you can specify the action to be performed if the operating system of a managed device has to be restarted for correct use, installation, or uninstallation of an application. The settings in the Restart management section are available only on devices running Windows:

  • Do not restart the operating system
  • Restart the operating system automatically if necessary
  • Prompt user for action
    • Repeat the prompt every (min)
    • Force restart after (min)
    • Force closure of applications in blocked sessions

See also:

Scenario: Regular updating Kaspersky databases and applications

Comparison of Network Agent settings by operating systems

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.