- About this Help Guide
- About Kaspersky Security for Virtualization 5.2 Light Agent
- Distribution kit
- Hardware and software requirements
- Requirements for Kaspersky Security Center components
- Requirements for the Integration Server installation
- Requirements for the virtual infrastructure
- Requirements for SVM resources with Kaspersky Security Protection Server
- Virtual machine requirements for installing the Light Agent for Windows
- Virtual machine requirements for installing the Light Agent for Linux
- Light Agent functional components
- Advanced features of the application
- What’s new
- Application architecture
- Preparing for application installation
- Installing the application
- Considerations for deploying the application when using Kaspersky Security Center 15 Linux
- Installing Kaspersky Security management MMC plug-ins and the Integration Server
- Automatic creating of tasks and default policy for Protection Server
- Starting the Integration Server Console
- Installing the Protection Server
- Selecting an action
- Selecting infrastructure for SVM deployment
- Selecting the SVM image
- Selecting the number of SVMs for deployment (infrastructures based on OpenStack)
- Specifying SVM settings
- Specifying SVM settings (infrastructures based on OpenStack)
- Configuring SVM network settings (infrastructures based on OpenStack)
- Configuring IP address settings for SVM
- Specifying Kaspersky Security Center connection settings
- Creating the configuration password and the root account password
- Starting SVM deployment
- Starting SVM deployment (infrastructures based on OpenStack)
- SVM deployment
- Finishing SVM deployment
- Preparing the Protection Server for operation
- Installing Kaspersky Security Center Network Agent on virtual machines
- Installing Light Agent for Windows
- Installing Light Agent for Windows via Kaspersky Security Center
- Installing Light Agent for Windows using the Installation Wizard
- The Start window of the Installation wizard
- Viewing Kaspersky Security End User License Agreement
- Selecting the type of installation
- Selecting installation components
- Selecting the installation folder
- Configuring the trusted zone
- Starting the installation
- Installing components
- Finishing the installation
- Installing Light Agent for Windows from the command line
- Installing Light Agent for Windows using Active Directory Group Policies
- Installing Light Agent for Windows on the virtual machine template
- Compatibility with Citrix App Layering technology
- Compatibility with Citrix Provisioning (Citrix Provisioning Services) technology
- Compatibility with VMware App Volumes technology
- Changing the composition of installed Light Agent for Windows components
- Installing Light Agent for Linux
- Preparing Light Agents for operation
- Changes in the Kaspersky Security Center Administration Console after installing Kaspersky Security
- Installing Kaspersky Security web plug-ins
- Viewing the list of SVMs connected to the Integration Server
- Viewing the list of Light Agents connected to SVMs
- Upgrading from a previous version of the application
- Removing the application
- Removing the Protection Server component
- Uninstalling the Light Agent for Windows component
- Uninstalling the Light Agent for Linux component
- Removing Kaspersky Security Center Network Agent on virtual machines
- Removing Kaspersky Security management plug-ins and the Integration Server
- Application management concept
- About managing the application using Kaspersky Security Center
- About managing the application using the Light Agent for Windows local interface
- Managing the application using Kaspersky Security Center policies
- Managing the application using tasks
- Manage tasks via Kaspersky Security Center
- Manage tasks via Light Agent for Windows local interface
- Managing Light Agent for Linux tasks from the command line
- Creating tasks
- Modifying task settings
- Starting and stopping tasks
- Configuring automatic pausing of scan tasks
- Viewing information on the progress and results of task execution
- Managing the application using Kaspersky Security Center Web Console
- About access rights to the settings of policies and tasks in Kaspersky Security Center
- About Integration Server Console
- Licensing of the application
- About the End User License Agreement
- About data provision
- About the license
- About the License Certificate
- About license key
- About the activation code
- About the key file
- About subscription
- About application activation
- Application activation procedure
- Renewing a license
- Renewing subscription
- Viewing information about the license keys used in Kaspersky Security Center
- Viewing information about the license key in a local interface
- Starting and stopping the application
- Virtual machine protection status
- Configuring the Integration Server connection settings
- Configuring the settings for connecting Light Agents to SVMs
- Configuring the general anti-virus protection settings
- Selecting types of detectable objects
- Configuring the trusted zone
- Configuring a trusted zone of Light Agent for Windows
- Creating an exclusion
- Enabling and disabling the use of an exclusion or exclusion category
- Deleting an exclusion or exclusion category
- Adding an application to the list of trusted applications
- Including or excluding a trusted application or category of trusted applications from scans
- Deleting a trusted application or category of trusted applications
- Creating the Light Agent for Linux exclusions
- Configuring a trusted zone of Light Agent for Windows
- Advanced Disinfection technology
- Protecting the file system of a virtual machine. File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Windows
- Enabling and disabling of File Anti-Virus for Windows
- Automatically pausing File Anti-Virus
- Changing the file security level
- Changing the File Anti-Virus action to take on infected files
- Editing the protection scope of File Anti-Virus
- Scanning of compound files by File Anti-Virus
- Optimizing file scanning by File Anti-Virus
- Changing the scan mode
- Using of Heuristic Analyzer with File Anti-Virus
- Using of iSwift technology in the operation of File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Linux via Kaspersky Security Center
- Enabling and disabling of File Anti-Virus for Linux
- Changing the file security level
- Changing the File Anti-Virus action to take on infected files
- Editing the protection scope of File Anti-Virus
- Scanning of compound files by File Anti-Virus
- Changing the scan mode
- Using of Heuristic Analyzer with File Anti-Virus
- Using of iChecker technology in the operation of File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Windows
- AMSI Protection
- Mail protection. Mail Anti-Virus
- Enabling and disabling Mail Anti-Virus
- Changing the mail security level
- Changing the action to take on infected email messages
- Editing the protection scope of Mail Anti-Virus
- Scan compound files that are attached to messages
- Filtering attachments in messages
- Using Heuristic Analyzer with Mail Anti-Virus
- Scanning emails in Microsoft Office Outlook
- Protecting virtual machine web traffic. Web Anti-Virus
- Enabling and disabling Web Anti-Virus
- Changing the web traffic security level
- Changing the action to take on malicious web traffic objects
- Checking web addresses against the database of phishing and malicious web addresses
- Using Heuristic Analyzer with Web Anti-Virus
- Editing the list of trusted web addresses
- Monitoring network traffic
- Firewall
- Enabling or disabling Firewall
- Changing the network connection status
- Managing network packet rules
- Managing network rules for applications and application groups
- Creating and editing a network rule for an application or an application group
- Changing the Firewall action for network rules of an application group via Kaspersky Security Center
- Changing the Firewall action for network rules in a local interface
- Changing the priority of a network rule for an application or an application group
- Enabling or disabling a network rule for an application or an application group
- Removing a network rule for an application or an application group
- Network Attack Blocker
- System Watcher
- Application Startup Control
- About Application Startup Control rules
- Enabling and disabling Application Startup Control
- Getting information about applications that are installed on protected virtual machines
- Creating the Inventory task
- Creating and editing the Application Startup Control rule
- Changing the operating status of an Application Startup Control rule
- Removing the Application Startup Control rule
- Configuring startup control of executable modules and drivers
- Editing Application Startup Control message templates
- Application Privilege Control
- Enabling and disabling Application Privilege Control
- Managing trust groups
- Working with application control rules
- Changing application control rules for trust groups and groups of applications
- Editing an application control rule in a local interface
- Disabling downloads and updates of application control rules from the Kaspersky Security Network database
- Disabling inheritance of restrictions from the parent process in a local interface
- Excluding specific application actions from application control rules in a local interface
- Configuring storage settings for control rules that govern unused applications
- Protecting operating system resources and personal data
- Device Control
- About rules of access to devices and connection buses
- Standard decisions on access to devices
- Enabling and disabling Device Control
- Editing a device access rule
- Editing a connection bus access rule
- Actions with trusted devices
- Editing templates of Device Control messages
- Providing access to a blocked device
- Web Control
- System Integrity Monitoring
- Enabling and disabling Real-Time System Integrity Monitoring
- Configuring the system integrity monitoring scope and the System Integrity Check scope
- Creating and updating the baseline
- Checking system integrity by schedule or on demand
- Viewing information about system integrity on a virtual machine
- System integrity status reset
- Network Monitor
- Scanning the virtual machine
- Creating a Virus scan task
- Configuring virus scan task settings for Light Agent for Windows
- Configuring virus scan task settings for Light Agent for Linux
- Configuring scan task settings in a local interface
- Specifics of scanning symbolic and hard links
- Scanning removable drives when they are connected to the virtual machine
- Managing unprocessed objects
- Interaction with other Kaspersky solutions
- Updating databases and application modules
- Enabling and disabling application module updates
- Automatically downloading the application module and database update package to SVMs
- Creating a Protection Server database update task
- Creating an SVM application module update task
- Configuring the update task run mode in a local interface
- Updating Light Agent for Windows databases and modules on a virtual machine template
- Rolling back the last update of databases and application modules
- Participating in Kaspersky Security Network
- Configuration of additional application settings
- Configuring the display of advanced policy properties for the Protection Server
- Configuring advanced settings of SVM operation
- Application Self-Defense
- Password-protecting access to application settings in a local interface
- Specifying a reason when terminating the application or disabling protection components in a local interface
- Configuring user interaction with the local interface
- Restoring the standard application settings in a local interface
- Using a configuration file
- Backup
- Reports and notifications
- SVM reconfiguration
- Selecting an action
- Selecting SVM for reconfiguration
- Entering the configuration password
- Editing SVM network settings
- Editing SVM network settings (infrastructures based on OpenStack)
- Changing SVM IP settings
- Changing Kaspersky Security Center connection settings
- Changing the configuration password and root account settings
- Starting SVM reconfiguration
- Starting SVM reconfiguration (infrastructures based on OpenStack)
- SVM reconfiguration
- Finishing SVM reconfiguration
- Viewing and editing Integration Server settings
- Monitoring SVM status
- Application components integrity check
- Using Kaspersky Security for Virtualization 5.2 Light Agent in multitenancy mode
- Deploying tenant protection infrastructure
- Configuring the Integration Server connection settings to the Kaspersky Security Center Administration Server
- Creating a tenant and a virtual Administration Server
- Configuring SVM location and Protection Server settings
- Configuring SVM discovery settings for Light Agents and general tenant protection settings
- Installing Light Agent on tenant virtual machines
- Registering tenant virtual machines
- Activating the tenant
- Registering existing tenants and their virtual machines
- Enabling and disabling tenant protection
- Getting tenant information
- Receiving tenant protection reports
- Removing virtual machines from the protected infrastructure
- Removing tenants
- Using Integration Server REST API in multi-tenancy scenarios
- Deploying tenant protection infrastructure
- Managing Light Agent for Linux from the command line
- Managing Light Agent for Windows from the command line
- Contacting Technical Support
- How to get technical support
- Technical Support via Kaspersky CompanyAccount
- Getting information for Technical Support
- About Protection Server and Light Agent dump files
- About the Kaspersky Security components installation Wizard trace files
- About Light Agent for Windows Installation Wizard trace files
- About trace files of the Integration Server and Integration Server Console
- Trace files of SVMs, Light Agent, and Kaspersky Security management plug-ins
- The SVM Management Wizard log
- Using the utilities and scripts from the Kaspersky Security distribution kit
- Appendices
- Using the klconfig script API to define SVM configuration settings
- Executing configuration commands
- Using the SVM first startup script
- Configuring SVM configuration settings
- Description of commands
- accept_eula_and_privacypolicy
- apiversion
- checkconfig
- check_viis_infra_accessibility
- connectorlang
- dhcp
- dhcprenew
- dns
- dnslookup
- dnssearch
- dnsshow
- getdnshostname
- gethypervisordetails
- hostname
- listpatches
- manageservices
- nagent
- network
- ntp
- passwd
- permitrootlogin
- productinstall
- reboot
- resetnetwork
- rollbackpatch
- setsshkey
- settracelevel
- test
- timezone
- version
- Settings in the setup.ini file
- Settings in the ScanServer.conf file
- Settings in the LightAgent.conf file
- Object ID values for SNMP
- Using the klconfig script API to define SVM configuration settings
- Sources of information about the application
- Glossary
- Activation code
- Active key
- Administration Server
- Application activation
- Application databases
- Backup
- Backup copy of a file
- Compound file
- Database of malicious web addresses
- Database of phishing web addresses
- Desktop key
- End User License Agreement
- Heuristic Analysis
- Infectable file
- Integration Server
- Kaspersky CompanyAccount
- Kaspersky Security Network (KSN)
- Key file
- Key with a limitation on the number of processor cores
- Key with a limitation on the number of processors
- Keylogger
- License
- License certificate
- License key (key)
- Light Agent
- OLE object
- OpenStack domain
- OpenStack project
- Phishing
- Protected virtual machine
- Reserve key
- Server key
- Signature Analysis
- Startup objects
- SVM
- SVM Management Wizard
- Update source
- Information about third-party code
- Trademark notices
System Watcher
The Kaspersky Security functionality described in this section is available only if the application is installed on a virtual machine with a Windows desktop or server operating system.
The System Watcher component analyzes the behavior of applications on a protected virtual machine and provides this information to other application components to improve their performance.
The System Watcher component utilizes Behavior Stream Signatures (BSS). Behavior stream signatures contain sequences of actions taken by applications that Kaspersky Security classifies as dangerous. If application activity corresponds to a behavior stream signature, Kaspersky Security performs the specified action. Use of behavior stream signatures lets you detect brand new and unknown malicious programs based on their behavior and stop their activity, thereby providing proactive protection of the virtual machine.
Based on information received by the System Watcher component, Kaspersky Security can roll back actions that have been performed by malware in the operating system. A rollback of malware actions can be initiated by File Anti-Virus or during a virus scan.
Rolling back malware activity has no adverse effects on the operating system or the integrity of protected virtual machine data.
The System Watcher component can also protect shared folders against external encryption by monitoring operations performed from a remote device.
The System Watcher component monitors operations performed only with those files that are stored on mass storage devices with the NTFS file system and that are not encrypted with EFS file system.
This section describes how to configure System Watcher settings using the Administration Console and the Light Agent for Windows local interface. You can also configure the System Watcher settings using the Web Console when creating or modifying the Light Agent for Windows policy settings (Application Settings → Anti-Virus protection → System Watcher).