- About this Help Guide
- About Kaspersky Security for Virtualization 5.2 Light Agent
- Distribution kit
- Hardware and software requirements
- Requirements for Kaspersky Security Center components
- Requirements for the Integration Server installation
- Requirements for the virtual infrastructure
- Requirements for SVM resources with Kaspersky Security Protection Server
- Virtual machine requirements for installing the Light Agent for Windows
- Virtual machine requirements for installing the Light Agent for Linux
- Light Agent functional components
- Advanced features of the application
- What’s new
- Application architecture
- Preparing for application installation
- Installing the application
- Considerations for deploying the application when using Kaspersky Security Center 15 Linux
- Installing Kaspersky Security management MMC plug-ins and the Integration Server
- Automatic creating of tasks and default policy for Protection Server
- Starting the Integration Server Console
- Installing the Protection Server
- Selecting an action
- Selecting infrastructure for SVM deployment
- Selecting the SVM image
- Selecting the number of SVMs for deployment (infrastructures based on OpenStack)
- Specifying SVM settings
- Specifying SVM settings (infrastructures based on OpenStack)
- Configuring SVM network settings (infrastructures based on OpenStack)
- Configuring IP address settings for SVM
- Specifying Kaspersky Security Center connection settings
- Creating the configuration password and the root account password
- Starting SVM deployment
- Starting SVM deployment (infrastructures based on OpenStack)
- SVM deployment
- Finishing SVM deployment
- Preparing the Protection Server for operation
- Installing Kaspersky Security Center Network Agent on virtual machines
- Installing Light Agent for Windows
- Installing Light Agent for Windows via Kaspersky Security Center
- Installing Light Agent for Windows using the Installation Wizard
- The Start window of the Installation wizard
- Viewing Kaspersky Security End User License Agreement
- Selecting the type of installation
- Selecting installation components
- Selecting the installation folder
- Configuring the trusted zone
- Starting the installation
- Installing components
- Finishing the installation
- Installing Light Agent for Windows from the command line
- Installing Light Agent for Windows using Active Directory Group Policies
- Installing Light Agent for Windows on the virtual machine template
- Compatibility with Citrix App Layering technology
- Compatibility with Citrix Provisioning (Citrix Provisioning Services) technology
- Compatibility with VMware App Volumes technology
- Changing the composition of installed Light Agent for Windows components
- Installing Light Agent for Linux
- Preparing Light Agents for operation
- Changes in the Kaspersky Security Center Administration Console after installing Kaspersky Security
- Installing Kaspersky Security web plug-ins
- Viewing the list of SVMs connected to the Integration Server
- Viewing the list of Light Agents connected to SVMs
- Upgrading from a previous version of the application
- Removing the application
- Removing the Protection Server component
- Uninstalling the Light Agent for Windows component
- Uninstalling the Light Agent for Linux component
- Removing Kaspersky Security Center Network Agent on virtual machines
- Removing Kaspersky Security management plug-ins and the Integration Server
- Application management concept
- About managing the application using Kaspersky Security Center
- About managing the application using the Light Agent for Windows local interface
- Managing the application using Kaspersky Security Center policies
- Managing the application using tasks
- Manage tasks via Kaspersky Security Center
- Manage tasks via Light Agent for Windows local interface
- Managing Light Agent for Linux tasks from the command line
- Creating tasks
- Modifying task settings
- Starting and stopping tasks
- Configuring automatic pausing of scan tasks
- Viewing information on the progress and results of task execution
- Managing the application using Kaspersky Security Center Web Console
- About access rights to the settings of policies and tasks in Kaspersky Security Center
- About Integration Server Console
- Licensing of the application
- About the End User License Agreement
- About data provision
- About the license
- About the License Certificate
- About license key
- About the activation code
- About the key file
- About subscription
- About application activation
- Application activation procedure
- Renewing a license
- Renewing subscription
- Viewing information about the license keys used in Kaspersky Security Center
- Viewing information about the license key in a local interface
- Starting and stopping the application
- Virtual machine protection status
- Configuring the Integration Server connection settings
- Configuring the settings for connecting Light Agents to SVMs
- Configuring the general anti-virus protection settings
- Selecting types of detectable objects
- Configuring the trusted zone
- Configuring a trusted zone of Light Agent for Windows
- Creating an exclusion
- Enabling and disabling the use of an exclusion or exclusion category
- Deleting an exclusion or exclusion category
- Adding an application to the list of trusted applications
- Including or excluding a trusted application or category of trusted applications from scans
- Deleting a trusted application or category of trusted applications
- Creating the Light Agent for Linux exclusions
- Configuring a trusted zone of Light Agent for Windows
- Advanced Disinfection technology
- Protecting the file system of a virtual machine. File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Windows
- Enabling and disabling of File Anti-Virus for Windows
- Automatically pausing File Anti-Virus
- Changing the file security level
- Changing the File Anti-Virus action to take on infected files
- Editing the protection scope of File Anti-Virus
- Scanning of compound files by File Anti-Virus
- Optimizing file scanning by File Anti-Virus
- Changing the scan mode
- Using of Heuristic Analyzer with File Anti-Virus
- Using of iSwift technology in the operation of File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Linux via Kaspersky Security Center
- Enabling and disabling of File Anti-Virus for Linux
- Changing the file security level
- Changing the File Anti-Virus action to take on infected files
- Editing the protection scope of File Anti-Virus
- Scanning of compound files by File Anti-Virus
- Changing the scan mode
- Using of Heuristic Analyzer with File Anti-Virus
- Using of iChecker technology in the operation of File Anti-Virus
- Configuring File Anti-Virus of Light Agent for Windows
- AMSI Protection
- Mail protection. Mail Anti-Virus
- Enabling and disabling Mail Anti-Virus
- Changing the mail security level
- Changing the action to take on infected email messages
- Editing the protection scope of Mail Anti-Virus
- Scan compound files that are attached to messages
- Filtering attachments in messages
- Using Heuristic Analyzer with Mail Anti-Virus
- Scanning emails in Microsoft Office Outlook
- Protecting virtual machine web traffic. Web Anti-Virus
- Enabling and disabling Web Anti-Virus
- Changing the web traffic security level
- Changing the action to take on malicious web traffic objects
- Checking web addresses against the database of phishing and malicious web addresses
- Using Heuristic Analyzer with Web Anti-Virus
- Editing the list of trusted web addresses
- Monitoring network traffic
- Firewall
- Enabling or disabling Firewall
- Changing the network connection status
- Managing network packet rules
- Managing network rules for applications and application groups
- Creating and editing a network rule for an application or an application group
- Changing the Firewall action for network rules of an application group via Kaspersky Security Center
- Changing the Firewall action for network rules in a local interface
- Changing the priority of a network rule for an application or an application group
- Enabling or disabling a network rule for an application or an application group
- Removing a network rule for an application or an application group
- Network Attack Blocker
- System Watcher
- Application Startup Control
- About Application Startup Control rules
- Enabling and disabling Application Startup Control
- Getting information about applications that are installed on protected virtual machines
- Creating the Inventory task
- Creating and editing the Application Startup Control rule
- Changing the operating status of an Application Startup Control rule
- Removing the Application Startup Control rule
- Configuring startup control of executable modules and drivers
- Editing Application Startup Control message templates
- Application Privilege Control
- Enabling and disabling Application Privilege Control
- Managing trust groups
- Working with application control rules
- Changing application control rules for trust groups and groups of applications
- Editing an application control rule in a local interface
- Disabling downloads and updates of application control rules from the Kaspersky Security Network database
- Disabling inheritance of restrictions from the parent process in a local interface
- Excluding specific application actions from application control rules in a local interface
- Configuring storage settings for control rules that govern unused applications
- Protecting operating system resources and personal data
- Device Control
- About rules of access to devices and connection buses
- Standard decisions on access to devices
- Enabling and disabling Device Control
- Editing a device access rule
- Editing a connection bus access rule
- Actions with trusted devices
- Editing templates of Device Control messages
- Providing access to a blocked device
- Web Control
- System Integrity Monitoring
- Enabling and disabling Real-Time System Integrity Monitoring
- Configuring the system integrity monitoring scope and the System Integrity Check scope
- Creating and updating the baseline
- Checking system integrity by schedule or on demand
- Viewing information about system integrity on a virtual machine
- System integrity status reset
- Network Monitor
- Scanning the virtual machine
- Creating a Virus scan task
- Configuring virus scan task settings for Light Agent for Windows
- Configuring virus scan task settings for Light Agent for Linux
- Configuring scan task settings in a local interface
- Specifics of scanning symbolic and hard links
- Scanning removable drives when they are connected to the virtual machine
- Managing unprocessed objects
- Interaction with other Kaspersky solutions
- Updating databases and application modules
- Enabling and disabling application module updates
- Automatically downloading the application module and database update package to SVMs
- Creating a Protection Server database update task
- Creating an SVM application module update task
- Configuring the update task run mode in a local interface
- Updating Light Agent for Windows databases and modules on a virtual machine template
- Rolling back the last update of databases and application modules
- Participating in Kaspersky Security Network
- Configuration of additional application settings
- Configuring the display of advanced policy properties for the Protection Server
- Configuring advanced settings of SVM operation
- Application Self-Defense
- Password-protecting access to application settings in a local interface
- Specifying a reason when terminating the application or disabling protection components in a local interface
- Configuring user interaction with the local interface
- Restoring the standard application settings in a local interface
- Using a configuration file
- Backup
- Reports and notifications
- SVM reconfiguration
- Selecting an action
- Selecting SVM for reconfiguration
- Entering the configuration password
- Editing SVM network settings
- Editing SVM network settings (infrastructures based on OpenStack)
- Changing SVM IP settings
- Changing Kaspersky Security Center connection settings
- Changing the configuration password and root account settings
- Starting SVM reconfiguration
- Starting SVM reconfiguration (infrastructures based on OpenStack)
- SVM reconfiguration
- Finishing SVM reconfiguration
- Viewing and editing Integration Server settings
- Monitoring SVM status
- Application components integrity check
- Using Kaspersky Security for Virtualization 5.2 Light Agent in multitenancy mode
- Deploying tenant protection infrastructure
- Configuring the Integration Server connection settings to the Kaspersky Security Center Administration Server
- Creating a tenant and a virtual Administration Server
- Configuring SVM location and Protection Server settings
- Configuring SVM discovery settings for Light Agents and general tenant protection settings
- Installing Light Agent on tenant virtual machines
- Registering tenant virtual machines
- Activating the tenant
- Registering existing tenants and their virtual machines
- Enabling and disabling tenant protection
- Getting tenant information
- Receiving tenant protection reports
- Removing virtual machines from the protected infrastructure
- Removing tenants
- Using Integration Server REST API in multi-tenancy scenarios
- Deploying tenant protection infrastructure
- Managing Light Agent for Linux from the command line
- Managing Light Agent for Windows from the command line
- Contacting Technical Support
- How to get technical support
- Technical Support via Kaspersky CompanyAccount
- Getting information for Technical Support
- About Protection Server and Light Agent dump files
- About the Kaspersky Security components installation Wizard trace files
- About Light Agent for Windows Installation Wizard trace files
- About trace files of the Integration Server and Integration Server Console
- Trace files of SVMs, Light Agent, and Kaspersky Security management plug-ins
- The SVM Management Wizard log
- Using the utilities and scripts from the Kaspersky Security distribution kit
- Appendices
- Using the klconfig script API to define SVM configuration settings
- Executing configuration commands
- Using the SVM first startup script
- Configuring SVM configuration settings
- Description of commands
- accept_eula_and_privacypolicy
- apiversion
- checkconfig
- check_viis_infra_accessibility
- connectorlang
- dhcp
- dhcprenew
- dns
- dnslookup
- dnssearch
- dnsshow
- getdnshostname
- gethypervisordetails
- hostname
- listpatches
- manageservices
- nagent
- network
- ntp
- passwd
- permitrootlogin
- productinstall
- reboot
- resetnetwork
- rollbackpatch
- setsshkey
- settracelevel
- test
- timezone
- version
- Settings in the setup.ini file
- Settings in the ScanServer.conf file
- Settings in the LightAgent.conf file
- Object ID values for SNMP
- Using the klconfig script API to define SVM configuration settings
- Sources of information about the application
- Glossary
- Activation code
- Active key
- Administration Server
- Application activation
- Application databases
- Backup
- Backup copy of a file
- Compound file
- Database of malicious web addresses
- Database of phishing web addresses
- Desktop key
- End User License Agreement
- Heuristic Analysis
- Infectable file
- Integration Server
- Kaspersky CompanyAccount
- Kaspersky Security Network (KSN)
- Key file
- Key with a limitation on the number of processor cores
- Key with a limitation on the number of processors
- Keylogger
- License
- License certificate
- License key (key)
- Light Agent
- OLE object
- OpenStack domain
- OpenStack project
- Phishing
- Protected virtual machine
- Reserve key
- Server key
- Signature Analysis
- Startup objects
- SVM
- SVM Management Wizard
- Update source
- Information about third-party code
- Trademark notices
Web resource content categories
To restrict access of virtual machine users to web resources, the web resource content categories listed below can be used.
The order of the listed categories does not reflect their relative significance or occurrence on the Internet. The names of the categories are conventional and used only for in Kaspersky applications and websites. The names do not necessarily correspond to the meanings assigned to them under applicable law. One web resource may belong to several categories at a time.
The category includes web resources related to the sexual side of human relationship. It can be content of any format and type.
- Pornography, erotic – web resources containing any photo or video materials depicting genitals of humans or humanoid creatures, acts of sexual intercourse or self-stimulation performed by human beings or humanoid creatures. This category also included web resources containing any text materials, including literary or artistic materials, describing genitals of humans or humanoid creatures, acts of sexual intercourse or self-stimulation performed by human beings or humanoid creatures. In addition, the category included web resources containing erotic materials, works that provide a realistic portrayal of sexual behavior of humans, or works of art designed to stimulate sexual arousal.
- Nudism – web resources dedicated to nudism: community sites, special places for recreation, photo hosting related to nudism, as well as sites containing relevant images.
- Lingerie – web resources that sell underwear, as well as sites for exhibitions, shows in underwear, erotic content showing people in the underwear.
- Sex education – web resources that contain:
- Articles and blogs covering sex education with both scientific and popular themes.
- Medical encyclopedias, specifically their sections about sexual reproduction.
- Resources of medical institutions, specifically their sections covering treatment of sexual organs.
- Adult dating – web resources that offer dating services, including those with a sexual connotation.
- LGBT+ – web resources that contain information about LGBT. These can be encyclopedias, forums, websites of the corresponding associations. Any information of any site on this subject.
- Sex shops – web resources of intimate shops, containing descriptions of these shops, and more.
- Abortion – web resources containing information about abortion, including on the websites of medical institutions.
This category includes web resources where users can download software packages:
- Web resources distributing audio and video materials: movies, recordings of sports broadcasts, recordings of concerts, songs, movie clips, videos, tutorial audio and video recordings, etc.
- Torrent trackers and file sharing websites irrespective of the physical location of files being distributed.
The category includes web resources that mention alcohol, drugs, any form of tobacco, including advertising, historical, medical and educational resources, as well as web resources where devices for the use of these substances are described or sold.
- Drugs – web resources, containing materials related to drug products, in particular, dedicated to the sale, advertising, description, historical and medical facts about drugs.
- Alcohol – web resources, containing materials related to alcohol and alcohol-containing products, in particular, dedicated to the sale, advertising, description, historical and medical facts alcohol.
- Tobacco – web resources, containing materials related to tobacco products, in particular, dedicated to the sale, advertising, description, historical and medical facts about tobacco.
This category includes web resources containing photo, video or text materials describing acts of physical or psychological violence directed against human beings, or cruel treatment of animals. Works of art can be excluded from this category.
Weapons, explosives, pyrotechnics
This category includes web resources with information about weapons, explosives, and pyrotechnical products.
The term "weapons" means appliances, items, and means designed to harm the life or health of humans and animals and/or damage equipment and structures.
This category includes web resources where profane language has been detected.
This category also includes web resources with linguistic and philological materials containing profanity as the subject of study.
Gambling, lotteries, sweepstakes
This category includes web resources containing:
- Gambling in which participants are required to make monetary contributions.
- Sweepstakes that involve betting with money.
- Lotteries that involve purchasing lottery tickets or numbers.
This category includes web resources that enable users (whether registered or not) to send personal messages to other users.
- Web mail – exclusively login pages of an email service and mailbox pages containing emails and associated data (such as personal contacts). This category is not assigned to other web pages of an Internet service provider that also offers email service.
- Social networks – websites designed for building, displaying, and managing contacts between persons, organizations, and governments, which require registration of a user account as a condition of participation.
- Chats, forums, IM – web-chats as well as web resources designed to distribute or support instant messaging applications that enable real-time communication. Forums – special web services for public discussion of various topics where the correspondence is saved.
- Blogs – web resources designed for public discussion of various topics using special web applications, including blog platforms (websites that provide paid or free services for creating and maintaining blogs).
- Dating sites – online dating resources that offer dating services, including without sexual connotation.
Online stores, banks, payment systems
This category includes web resources designed for any online transactions in non-cash monetary funds using special-purpose web applications. It also includes web resources that help you rent, rent, buy or sell real estate.
- Online stores – online shops and auctions selling any goods, work or services to individuals and/or legal entities, including websites of stores that conduct sales exclusively online and online profiles of physical stores that accept online payments.
- Banks – web resources of banks.
- Payment systems – this category includes the following web pages:
- Specialized web pages of banks with online banking functionality, including wire (electronic) transfers between bank accounts, making bank deposits, performing currency conversion, paying for third-party services, etc.
- Web pages of e-money systems that provide access to the user's personal account.
- Cryptocurrencies, mining – websites offering services for buying and selling cryptocurrency as well as informational services concerning cryptocurrencies and mining.
This category includes web resources designed to bring together employers and job seekers. They include:
- Websites of recruitment agencies (employment agencies and/or headhunting agencies).
- Websites of employers with descriptions of available job openings and their advantages.
- Independent portals with offers of employment from employers and recruitment agencies.
- Professional social networks that, among all else, make it possible to publish or find information about specialists who are not actively searching for employment.
The category includes web resources that act as an intermediary for downloading content from other web resources using special web applications for:
- Bypassing restrictions imposed by a LAN administrator on access to web addresses or IP addresses.
- Anonymously accessing web resources, including web resources that specifically reject HTTP requests from certain IP addresses or their groups (for example, IP addresses grouped by country of origin).
The category includes web resources dedicated to various types of computer games, as well as gaming communities and services.
Religions, religious associations
This category includes web resources with materials on public movements, associations, and organizations with a religious ideology and/or cult in any manifestations.
News portals of any subject including social news, news aggregators, rss mailings.
This category includes web resources with banners. Advertising information on banners may distract users from their activities, while banner downloads increase the amount of traffic.