Network Agent policy settings
Dec 4, 2023
To configure the Network Agent policy:
- In the main menu, go to Devices → Policies & profiles.
- Click the name of the Network Agent policy.
The properties window of the Network Agent policy opens.
Consider that for Windows, macOS, and Linux-based devices, various settings are available.
On this tab, you can modify the policy status and specify the inheritance of policy settings:
- Under Policy status, you can select one of the policy modes:
- In the Settings inheritance settings group, you can configure the policy inheritance:
On this tab, you can configure event logging and event notification. Events are distributed according to importance level in the following sections on the Event configuration tab:
- Functional failure
In each section, the event type list shows the types of events and the default event storage term on the Administration Server (in days). After you click the event type, you can specify the settings of event logging and notifications about events selected in the list. By default, common notification settings specified for the entire Administration Server are used for all event types. However, you can change specific settings for required event types.
For example, in the Warning section, you can configure the Incident has occurred event type. Such events may happen, for instance, when the free disk space of a distribution point is less than 2 GB (at least 4 GB are required to install applications and download updates remotely). To configure the Incident has occurred event, click it and specify where to store the occurred events and how to notify about them.
If Network Agent detected an incident, you can manage this incident by using the settings of a managed device.
In the Settings section, you can configure the Network Agent policy:
- Distribute files through distribution points only
- Maximum size of event queue, in MB
- Application is allowed to retrieve policy's extended data on device
- Protect the Network Agent service against unauthorized removal or termination, and prevent changes to the settings
- Use uninstallation password
In the Repositories section, you can select the types of objects whose details will be sent from Network Agent to Administration Server. If modification of some settings in this section is prohibited by the Network Agent policy, you cannot modify these settings.
- Details of installed applications
- Include information about patches
- Details of Windows Update updates
- Details of software vulnerabilities and corresponding updates
- Hardware registry details
Software updates and vulnerabilities
In the Software updates and vulnerabilities section, you can configure search and distribution of Windows updates, as well as enable scanning of executable files for vulnerabilities. The settings in the Software updates and vulnerabilities section are available only on devices running Windows:
- Use Administration Server as a WSUS server
- You can limit Windows updates that users can install on their devices manually by using Windows Update.
On devices running Windows 10, if Windows Update has already found updates for the device, the new option that you select under Allow users to manage installation of Windows Update updates will be applied only after the updates found are installed.
Select an item in the drop-down list:
- In the Windows Update search mode settings group, you can select the update search mode:
- Scan executable files for vulnerabilities when running them
In the Restart management section, you can specify the action to be performed if the operating system of a managed device has to be restarted for correct use, installation, or uninstallation of an application. The settings in the Restart management section are available only on devices running Windows:
- Do not restart the operating system
- Restart the operating system automatically if necessary
- Prompt user for action
Windows Desktop Sharing
In the Windows Desktop Sharing section, you can enable and configure the audit of the administrator's actions performed on a remote device when desktop access is shared. The settings in the Windows Desktop Sharing section are available only on devices running Windows:
Manage patches and updates
In the Manage patches and updates section, you can configure download and distribution of updates, as well as installation of patches, on managed devices:
- Automatically install applicable updates and patches for components that have the Undefined status
- Download updates and anti-virus databases from Administration Server in advance (recommended)
The Connectivity section includes three subsections:
- Connection profiles
- Connection schedule
In the Network subsection, you can configure the connection to Administration Server, enable the use of a UDP port, and specify the UDP port number.
- In the Connect to Administration Server settings group, you can configure connection to the Administration Server and specify the time interval for synchronization between client devices and the Administration Server:
- Use UDP port
- UDP port number
- Use distribution point to force connection to Administration Server
In the Connection profiles subsection, you can specify the network location settings and enable out-of-office mode when Administration Server is not available. The settings in the Connection profiles section are available only on devices running Windows and macOS:
- Network location settings
- Administration Server connection profiles
- Enable out-of-office mode when Administration Server is not available
In the Connection schedule subsection, you can specify the time intervals during which Network Agent sends data to the Administration Server:
Network polling by distribution points
In the Network polling by distribution points section, you can configure automatic polling of the network. The polling settings are available only on devices running Windows. You can use the following options to enable the polling and set its frequency:
Network settings for distribution points
In the Network settings for distribution points section, you can specify the internet access settings:
- Use proxy server
- Port number
- Bypass proxy server for local addresses
- Proxy server authentication
- User name
KSN Proxy (distribution points)
In the KSN Proxy (distribution points) section, you can configure the application to use the distribution point to forward Kaspersky Security Network (KSN) requests from the managed devices:
- Enable KSN Proxy on distribution point side
- Forward KSN requests to Administration Server
- Access KSN Cloud/Private KSN directly over the internet
- UDP port
Updates (distribution points)
In the Updates (distribution points) section, you can enable the downloading diff files feature, so distribution points take updates in the form of diff files from Kaspersky update servers.
On this tab, you can view the list of the policy revisions and roll back changes made to the policy, if necessary.