Built-in tools in Kaspersky Security for Virtualization 6.x Agentless
inventory_view_format_client
Tool for displaying the inventory tree.
To switch to the flat list, use the -m key.
The format line is set by the -f key. It can contain the values listed below.
- Identification:
- %i — ID of the managed object (moid) Example: vm-51
- %I — Instance UUID. Example: 501FDB2F-C55C-F4CC-D808-84E0D44AC49D.
- %h — host name. Example: linux.avp.ru.
- %l — Location ID. Example: 564D304D-4499-8EB7-8024-7E18E179D2A3.
- %u — BIOS UUID. Example: 421F2D74-4A66-2D23-6A71-4852D901A3C8.
- Information about the guest operating system:
- %G — Guest operating system type. Example: winLonghornGuest.
- %o — full name of the operating system. Example: Microsoft Windows 7 (32-bit).
- %O — Operating system type. Possible values: ServerOS, WorkstationOS, UnknownOS
- Virtual machine parameters:
- %p — Virtual machine state Possible values: PowerOn, PowerOff, Suspend, StandBy, Unknown
- %t — If the machine is a VM template Possible values: isTemplate, notTemplate
- %m — If machine is a Kaspersky Lab SVM Possible values: isSVM, notSVM
- %t — If the machine is a service VM Possible values: isManaged, notManaged
- Protection and activity (only available on a file protection virtual machine):
- %P — If the virtual machine is under the file protection policy of VMware NSX Possible values: Applied, NotApplied, NotApplicable, Unknown
- %e – If OAS protection of the SVM is enabled in the protection profile. Possible values: ShouldProtect, ShouldNotProtect
- %E — If the connection to the virtual machine through VMware EPSec is active Possible values: DVFilterOn, DVFilterOff
- %E — If the ODS scanning of the virtual machine through VMware EPSec is available Possible values: EPSecAvailable, EPSecUnavailable
- %c — ID of the NSX profile configuration.
- Temporary labels (in the format YYYY-MM-DDThh:mm:ss.0000000Z or never):
- %r — Time of the latest notification about the OAS protection activity.
- %z — Start time of the latest SVM protection period.
- %Z — End time of the latest SVM protection period.
- %s — Start time of the latest On-Demand scan.
- %s — Finish time of the latest On-Demand scan
- %n — Time of the latest incoming network attack detection
- %n — Time of the latest outgoing network attack detection
- %v — Time of the latest detection of malware.
- %T — ID of the client company, whose infrastructure includes the SVM.
ksv_policy_editor and ksv_policy_manager_client
Tool for a policy applied to an SVM (Secure virtual machine).
licenser_client
Tool for license management. Default action — CheckLicense.
Commands must be entered using the -a key:
- InstallActiveKey — add the active key. Specify the path to the license key location using the -k key.
- RevokeActiveKey — remove the active key. Specify the path to the license key location using the -k key.
- InstallReserveKey — add a reserve key. Specify the path to the license key location using the -k key.
- RevokeReserveKey — remove the reserve key. Specify the path to the license key location using the -k key.
- ActivateActiveCode — apply the activation code. The code must be submitted using the -c key.
- ActivateReserveCode — add the reserve activation code. The code must be submitted using the -c key.
- CheckLicense — view the license information. Does not require additional parameters.
- SetSettings — submit the language and the installation ID through the keys -l and -u.
autopatch_client
Tool for running and stopping the task of installing the downloaded autopatches. Default action — running the task.
Available parameters:
- -h [ --help ] — show help information.
- -s [ --stop ] — stop tasks.
- -w [ --wait ] — wait until the task is completed.
- -p [ --port ] — port number.
check_policy_client
Tool for checking the protection policy.
- The current policy is custom (when the policy was received from Kaspersky Security Center).
- The current policy is default.
detect_cache_purge_client
Tool for clearing cache of detected threats.
Only available on a file protection virtual machine.
emergency_event_log and event_log_client
Tools for generating events which are sent to Kaspersky Security Center.
- event_log_client — sends the event.
- emergency_event_log_client — writes an event to /var/opt/kaspersky/ksv/events.
ksvscan_client
Tool for displaying information about the antivirus databases’ status.
Only available on a file protection virtual machine.
klmover
A tool which allows changing the Kaspersky Security Center Administration Server address and the data exchange mode in the SVM configuration settings.
product_status_client
Tool for checking the status of Kaspersky Security for Virtualization 6.0 Agentless.
Default action: getting the return key for scripts.
To display the notification, use the -v key.
qb_client
Tool for operations with quarantine and backup.
Available parameters:
- -l [ --list ] — getting information about objects. Applies to all objects if specific objects were not selected.
- -r [ --restore ] - list of indexes of the objects to be restored. Must be separated by spaces.
- -r [ --restore ] - list of IDs of objects to be restored. Must be separated by spaces.
- -r [ --restore ] - list of indexes of the objects to be deleted. Must be separated by spaces.
- -r [ --restore ] - list of IDs of the objects to be deleted. Must be separated by spaces.
- -E [ --export ] - exporting backup copies from a folder.
- -I [ --import ] - importing backup copies to a folder.
- -s [ --source ] - source folder of backed up objects. If the folder is empty, remoting is used.
updater_client
Tool for update and rollback of databases.
The update and rollback commands are available.
vicreds
Tool for viewing or editing the vcenter.db parameters for connecting the SVM to the VMware vCenter Server or the Integration Server.
The -r key is used for viewing the parameters.
The specified parameters are written to vcenter.db and reviewed upon the product restart.
To transfer the specified parameters directly to the application, use the -y key.
ksv_policy_editor and ksv_policy_manager_ client
Tools for viewing and editing the policy applied on the SVM.