Scenario: Configuring network protection

The Quick Start Wizard creates policies and tasks with the default settings. These settings may turn out to be sub-optimal or even disallowed by the organization. Therefore, we recommend that you fine-tune these policies and tasks and create other policies and tasks, if they are necessary for your network.

Prerequisites

Before you start, make sure that you have done the following:

Configuring network protection proceeds in stages:

  1. Setup and propagation of Kaspersky application policies and policy profiles

    To configure and propagate settings for Kaspersky applications installed on the managed devices, you can use two different security management approaches—device-centric or user-centric. These two approaches can also be combined.

  2. Configuring tasks for remote management of Kaspersky applications

    Check the tasks created with the Quick Start Wizard and fine-tune them, if necessary.

    How-to instructions: Setting up the group task for updating Kaspersky Endpoint Security.

    If necessary, create additional tasks to manage the Kaspersky applications installed on the client devices.

  3. Evaluating and limiting the event load on the database

    Information about events during the operation of managed applications is transferred from a client device and registered in the Administration Server database. To reduce the load on the Administration Server, evaluate and limit the maximum number of events that can be stored in the database.

    How-to instructions: Setting the maximum number of events.

Results

Upon completion of this scenario, your network will be protected by configuration of Kaspersky applications, tasks, and events received by the Administration Server:

When the network protection configuration is complete, you can proceed to configuring regular updates to Kaspersky databases and applications.

See also:

Scenario: Installation and initial setup of Kaspersky Security Center 13 Web Console

Scenario: Regular updating Kaspersky databases and applications

Page top