In the course of operation, the application uses data that requires the permission of the Kaspersky Web Traffic Security administrator to be transmitted or processed.
You can view the list of data and the terms on which it is used as well as give consent to data processing in the following agreements between your organization and Kaspersky:
According to the terms of the End User License Agreement that you have accepted, you consent to automatically send Kaspersky the information required to enhance the protection of the corporate IT infrastructure. This information is enumerated in the End User License Agreement in the Data Processing Terms:
If Kaspersky Web Traffic Security was installed from an ISO file, you can view the text of the End User License Agreement at any time in the /opt/kaspersky/kwts-appliance-addon/share/htdocs/<language code>/eula directory in Technical Support Mode.
If Kaspersky Web Traffic Security is installed from an RPM or DEB package, you can view the text of the End User License Agreement at any time in the /opt/kaspersky/kwts/share/htdocs/<language code>/eula directory.
In the course of participation in the Kaspersky Security Network and submission of KSN statistics to Kaspersky, information can be transmitted that was obtained as a result of the application operation. The list of data that is transmitted is provided in the Kaspersky Security Network Statement and the Supplementary Kaspersky Security Network Statement.
Kaspersky protects any information received in this way as prescribed by law and applicable rules of Kaspersky. Data is transmitted through encrypted data channels.
The memory of Kaspersky Web Traffic Security may contain any data of application users that is being processed. The Kaspersky Web Traffic Security administrator must independently ensure the security of such data.
By default, access to personal data of users is granted only to the root user of the operating systems, the Kaspersky Web Traffic Security Local Administrator, and the kluser system user for running application components. The application itself does not provide the tools to restrict the privileges of administrators and other users of operating systems in which the application is installed. The administrator is advised to use any system resources at their own discretion to control access to the personal data of other users.
The following table contains the complete list of user data that can be stored by Kaspersky Web Traffic Security.
User data that can be stored in Kaspersky Web Traffic Security
Data type |
Where data is used |
Storage location |
Storage duration |
---|---|---|---|
Basic functionality of the application |
|||
|
Application configuration |
/var/opt/kaspersky |
Indefinite. |
|
Traffic processing rules |
/var/opt/kaspersky |
Indefinite. |
Information from requests to access web resources:
|
Application statistics |
/var/opt/kaspersky |
Indefinite. |
Information from requests to access web resources:
Information about the LDAP attributes of users:
|
Traffic processing event log |
|
In accordance with settings specified by the user of the application. By default, the storage term is 3 days or the maximum size of the log is 1 GB. When this limit is reached, the older records are deleted. |
|
System events log |
|
In accordance with settings specified by the user of the application. 100 thousand records are stored by default. When this limit is reached, the older records are deleted. |
Information from requests to access web resources:
Data on application updates:
Information about user accounts:
|
Trace files |
/var/log/kaspersky |
Indefinite. When 150 GB is reached for each trace stream, the oldest records are deleted. |
/var/log/kaspersky/extra |
Indefinite. When 400 GB is reached for each trace stream, the oldest records are deleted. |
||
Information from requests to access web resources:
|
Temporary files |
/tmp/kwtstmp |
Until the application is restarted. |
Integration with Kaspersky Anti Targeted Attack Platform (KATA) |
|||
Users' files |
Sending files to the KATA server |
/tmp/kwtstmp |
Until the application is restarted. The maximum allowed size of the queue is 5 thousand files. When this limit is reached, files are no longer placed in queue. |
Information from KATA alerts:
|
Receiving objects detected by KATA |
/var/opt/kaspersky/kwts/detects.cache |
Specified by the user in the Cache storage period (hours) setting. The default value is 48 hours. |
Active Directory® integration |
|||
|
|
/var/opt/kaspersky/kwts/ldap/cache.dbm |
Indefinite. Data is regularly updated. When integration with Active Directory is disabled, the data is deleted. |
Use of Kaspersky Security Network (KSN) |
|||
|
Transmission of KSN requests |
/var/opt/kaspersky |
Indefinite. The maximum number of stored records is 360 thousand. When this limit is reached, the records that have not been requested for the longest time are deleted. |
Information about the application and the computer:
Information about scans of URLs by the Anti-Virus and Anti-Phishing modules.
Information about scanned files:
Information about errors of the application:
Information about updates of application components and databases:
Information on the Updater component:
|
KSN statistics |
/var/opt/kaspersky |
Until the statistics are sent to KSN. After disabling the sending of KSN statistics in application settings, the data is deleted when the next attempt to send them occurs. |
Functionality available only when the application is deployed from an ISO image. |
|||
Decryption of TLS/SSL connections:
Kerberos authentication settings:
NTLM authentication settings:
|
Built-in proxy server settings. |
/etc/squid/ /var/opt/kaspersky/ |
Indefinite. Data is deleted when the corresponding settings are deleted in the web interface of the application. Certificate files may be overwritten when the certificate is replaced. |
Information from requests to access web resources:
|
Proxy server event log |
/var/log/squid/icap.log /var/log/squid/ssl.log /var/log/squid/squid.out /var/log/squid/access.log /var/log/squid/cache.log |
Indefinite. When 3 GB is reached for each trace stream, the oldest records are deleted. |
Kerberos authentication settings:
|
Proxy server event log |
/var/log/squid/cache.log |
Indefinite. When 10 GB is reached for each trace stream, the oldest records are deleted. |
NTLM authentication settings:
|
Proxy server event log |
/var/log/squid/cache.log |
Indefinite. When 10 GB is reached for each trace stream, the oldest records are deleted. |
Connection over the SSH protocol:
Connection through the web interface:
|
Authorization event log |
/var/log/secure |
No more than 5 weeks. Files are rotated once a week. |
Information from requests to access web resources:
Information about the LDAP attributes of users:
Information about system events:
|
System events and traffic processing events log |
/var/log/kwts-messages |
No more than 5 weeks. Files are rotated once a week. |
You can manage the dump settings if you use the superuser account to manage the application from the management console of the server on which the application is installed. A dump is generated whenever the application crashes and can be useful for analyzing the causes of the crash. The dump may include any data, including fragments of analyzed files.
By default, dump generation in Kaspersky Web Traffic Security is disabled.
Access to such data can be gained using the management console of the server on which the application is installed, using a user account with superuser privileges.
When sending diagnostic information to Kaspersky Technical Support, the Kaspersky Web Traffic Security administrator must independently ensure the security of dump files and trace files.
The administrator of Kaspersky Web Traffic Security is responsible for access to this information.
Page top