Help for Kaspersky Web Traffic Security
- Kaspersky Web Traffic Security
- Licensing the application
- Scaling Kaspersky Web Traffic Security
- Installation and initial configuration of the application from an RPM or DEB package
- Installation and initial configuration of the application deployed from an ISO image
- Deploying a virtual machine in the VMware ESXi Hypervisor Management Console
- Deploying a virtual machine in the VMware vSphere web interface
- Deploying a virtual machine in the Management Console of Microsoft Hyper-V Manager
- Deploying a virtual machine using Microsoft SCVMM
- Application installation and initial configuration
- Removing an application deployed from an ISO image
- Preparing to remove the application
- Removing the application from a physical server
- Removing a virtual machine in the VMware ESXi Hypervisor Management Console
- Removing a virtual machine in the VMware vSphere web interface
- Removing a virtual machine in the Microsoft Hyper-V Hypervisor Management Console
- Removing a virtual machine using Microsoft SCVMM
- Getting started with the application
- Monitoring application operation
- Reports
- Kaspersky Web Traffic Security event log
- Using traffic processing rules
- Scenario for configuring access to web resources
- Adding a bypass rule
- Adding an access rule
- Adding a protection rule
- Configuring a rule triggering initiator
- Configuring traffic filtering
- Adding an exclusion for a traffic processing rule
- Configuring the schedule of a traffic processing rule
- Modifying a traffic processing rule
- Deleting a traffic processing rule
- Creating a copy of a traffic processing rule
- Enabling and disabling a traffic processing rule
- Changing the order of applied rules
- Working with traffic processing rule groups
- Configuring a default protection policy
- Monitoring traffic processing rules
- Managing workspaces
- Working with roles and user accounts
- Managing the cluster
- Creating a new cluster
- Configuring the display of the cluster node table
- Viewing information about a cluster node
- Adding a node to a cluster
- Modifying node settings
- Removing a node from a cluster
- Changing the role of a node in a cluster
- Deleting the cluster
- Checking data integrity
- Connecting to cluster nodes over the SSH protocol
- Restarting a cluster node
- Application operation in emergency mode
- Protecting network traffic
- ICAP server settings
- Block page
- Exporting and importing settings
- Upgrading the application from version 6.0 to version 6.1
- Installing update packages
- Installing the kwts_upgrade_6.1.0.4762_os_security_november_2024 update package
- Configuring the server time
- Configuring proxy server connection settings
- Updating Kaspersky Web Traffic Security databases
- Participating in Kaspersky Security Network and using Kaspersky Private Security Network
- Connecting to a LDAP server
- Configuring integration with Kaspersky Anti Targeted Attack Platform
- Syslog event log
- Application management over the SNMP protocol
- Single Sign-On authentication
- Managing the settings of a built-in proxy server in the application web interface
- Decrypting TLS/SSL connections
- Processing CONNECT requests
- About TLS connections
- Managing certificates for intercepting SSL connections
- Enabling and disabling decryption of SSL connections
- Selecting the default action for SSL connections
- Managing SSL rules
- Managing trusted certificates
- Sources of information about the application
- Publishing application events to a SIEM system
- Contacting the Technical Support
- Appendix 1. Installing and configuring the Squid service
- Appendix 2. Configuring integration of the Squid service with Active Directory
- Configuring Kerberos authentication
- Configuring NTLM authentication
- Installing the Samba service
- Configuring time synchronization
- Configuring DNS
- Configuring Samba on the server hosting the Squid service
- Checking Samba settings on the server hosting the Squid service
- Configuring the Squid service
- Configuring the client side of NTLM authentication
- Configuring NTLM authentication of a host that is not in a domain
- Configuring Basic authentication
- Appendix 3. Configuring ICAP balancing using HAProxy
- Appendix 4. MIME types of objects
- Appendix 5. URL normalization
- Appendix 6. Website categories
- Appendix 7. Physical processor core bandwidth values depending on the type of proxy server and the required protection level
- Appendix 8. Virtual processor bandwidth values depending on the type of proxy server and the required protection level
- Glossary
- Access rule
- Basic authentication
- Bypass rule
- Certificate fingerprint
- Cluster
- Directory service
- Heuristic analysis
- ICAP server
- Kaspersky Private Security Network
- Kaspersky Security Network (KSN)
- Kerberos authentication
- Keytab file
- Layout
- LDAP
- License serial number
- Malicious links
- MIB (Management Information Base)
- nginx service
- Node with role Control
- Node with role Secondary
- Normalization
- NTLM authentication
- Phishing
- Protection rule
- PTR record
- Replay cache
- Reputation filtering
- SELinux (Security-Enhanced Linux)
- Service principal name (SPN)
- SIEM system
- SNI (Server Name Indication)
- SNMP agent
- SNMP trap
- Squid
- SRV record
- SSL Bumping
- Syslog
- TLS encryption
- Tracing
- Traffic processing rule
- Update source
- Virus
- Workspace
- AO Kaspersky Lab
- Information about third-party code
- Trademark notices
Creating a virtual machine in the Management Console of Microsoft Hyper-V Manager
Prior to creating a virtual machine, you must place the ISO file in any network folder that can be accessed by the server with the hypervisor. If you open the Microsoft Hyper-V Manager console on the same server on which the hypervisor is installed, you can place the ISO file on a local hard drive.
To create a virtual machine:
- Open the Management Console of Microsoft Hyper-V Manager.
- In the left part of the window, select the hypervisor on which you want to deploy the virtual machine image.
- In the context menu, select New → Virtual Machine.
The Virtual Machine Creation Wizard opens.
- Follow the steps of the Wizard:
- Select the virtual machine name and path.
- Type the name of the new virtual machine in the Name field.
The name must be unique among the names of all existing virtual machines.
- To select a different folder for saving the virtual machine:
- Select the Store the virtual machine in a different location check box.
- In the Location field, specify the path to the folder where you want to save the virtual machine.
The default folder is <disk>:\Virtual Machines.
- Click Next.
The Wizard proceeds to the next step.
- Type the name of the new virtual machine in the Name field.
- Select the virtual machine generation.
- Select the Generation 1 option.
- Click Next.
The Wizard proceeds to the next step.
- Allocate memory for the virtual machine.
- In the Startup memory field, specify the amount of RAM that will be allocated for the virtual machine.
The minimum recommended value is 16384 MB. You can specify a larger value if you require higher performance of the virtual machine.
- Clear the Use Dynamic Memory for this virtual machine check box.
- Click Next.
The Wizard proceeds to the next step.
- In the Startup memory field, specify the amount of RAM that will be allocated for the virtual machine.
- Configure the network connection.
- In the Connection drop-down list, select the virtual network to which the virtual machine will connect.
- Click Next.
The Wizard proceeds to the next step.
- Connect a virtual hard drive.
- Select Create a virtual hard disk.
- In the Name field, specify the name of the virtual drive that you are creating.
- In the Location field, select the location for storing data of the virtual drive on the physical server.
- In the Size field, specify the amount of disk space that will be allocated for the virtual machine.
The minimum recommended value is 200 GB. You can specify a larger value if you need to save a large database for the event log.
- Click Next.
The Wizard proceeds to the next step.
- Select the drive for deploying the virtual machine image.
- In the list of actions, select Install an operating system from a bootable image file.
- In the Media settings group, in the Image file (.iso) field, specify the path to the ISO image for installing the virtual machine.
- Click Next.
The Wizard proceeds to the next step.
- Confirm creation of the virtual machine.
- Verify that the virtual machine settings configured at previous steps are correct.
- If all settings are configured correctly, click the Finish button.
- Select the virtual machine name and path.
A virtual machine with the defined settings will be created. Make sure that it is displayed in the Virtual Machines list on the selected hypervisor.
The virtual machine is created with the default number of processors. You must change this setting in the properties of the virtual machine after it is created.