Configuring the application
July 10, 2024
ID 255931
You can configure the application through the web interface of the Control node of the cluster. The new settings are automatically propagated to Secondary nodes.
The application configuration scenario consists of the following steps:
- Configuring time and time zone synchronization
- Configuring the connection to the proxy server
Perform this step if the node does not have direct Internet access for activating the application, updating databases, and interacting with Kaspersky.
- Application activation
Activate KSMG using an activation code or, if you do not have Internet access, add a license key using a key file.
- Configuring application database updates
If you do not have Internet access, configure application database updates via an update source located in the local network.
- Updating databases manually
Wait for the update task to complete. Restart the operating system to apply the database update.
- Configuring protection settings
- Configuring Backup settings
- Configuring participation in Kaspersky Security Network
If you want to have access to Kaspersky Security Network reputation databases and other statistical data without sending data from your computers to Kaspersky Security Network, you can configure the use of Kaspersky Private Security Network.
- Configuring integration with the KATA server
Perform this step if the KATA application is deployed in your organization.
- Configuring integration with an external directory service over LDAP
- Configuring Single Sign-On (SSO) user authentication
This step is required if you want personal and privileged users to use domain accounts.
- Creating user accounts and roles
Assign roles to users as necessary.
If the 'helpdesk' account was used in the previous version of the application, create a role with similar permissions: viewing messages in Backup, delivering messages from Backup, managing addresses in personal allow and deny lists.
- Configuring basic built-in MTA settings
- Configuring TLS encryption for the built-in MTA
- Adding domains and configuring routing
- Configuring the DKIM signature
- Configuring verification of recipient addresses
- Configuring the application for personal users
Configure personal user account settings, personal Backup settings, and the personal Backup digest schedule.
- Migrating message processing rules and personal lists of users from the previous version of the application
When upgrading the application from a previous version, you can export rules and personal lists of users from the old version, and then import them into the new version.
To import settings, specify the path to the KSMG_settings.kz file obtained by exporting application settings from the previous version.
- Configuring message processing rules
You must perform this step if data for importing rules does not exist or if you need additional rules.
- Configuring system log settings
- Configuring the export of events to an external SIEM system
- Configuring application monitoring using SNMP
- Configuring email notifications about application events
- Configuring application statistics report schedule settings