Same Info in:   Русский English 


KL 102.98. Kaspersky Endpoint Security for Windows

This course shows how to install Kaspersky Security Center, remotely deploy Kaspersky Endpoint Security, set up centralized updating and notifications, enforce a protection policy, run virus scans, and do other typical actions of an anti-virus security administrator.
      Start Start


Introduction This part discusses how managing anti-virus protection of a network is different from using anti-virus on a personal computer, how the scale changes approaches to setting up protection policies, running scan tasks and dealing with viruses. The part also introduces Kaspersky Security Center as the system that helps control Kaspersky Endpoint Security across the network.

Unit 0. Migration

Chapter 0.1. General This chapter describes the new products that will replace Kaspersky Anti-Virus and Kaspersky Administration Kit and the steps to be taken to upgrade the administration system and protection tools on the client computers.
Chapter 0.2. Upgrading Administration System Version This chapter introduces the system requirements for Kaspersky Security Center and the upgrade procedure for the Administration Server and other management system components.
Chapter 0.3. Converting Tasks and Policies From this chapter you will learn how to convert the policies and tasks of the previous version into the current one, which settings are preserved during the conversion and how to avoid potential conflicts after the conversion.
Chapter 0.4. Upgrading Network Agent and Anti-Virus This chapter presents the system requirements for Kaspersky Endpoint Security and the Anti-Virus upgrade procedure explained through the example of the automatic installation task.

Unit 1. Deployment

Chapter 1.1. Organizational Issues This chapter explains how to plan the deployment of an anti-virus protection system, where to start, what the usual problems are, and how to solve them.
Chapter 1.2. Installation of Kaspersky Security Center In this chapter you will learn how to install Kaspersky Security Center: what the system requirements are, what decisions you have to make and what depends on them.
Chapter 1.3. Installation on Computers This chapter overviews the usual ways to remotely deploy applications across different kinds of network: how each method works, what makes it useful in a particular situation, and what the limits of each method are.
Chapter 1.4. Management of Computer Structure This chapter shows how to create subgroups of managed computers, how to put computers into groups, and how to avoid doing this by configuring computer relocation rules. The chapter also explains why you may need multiple groups in the first place and how you can import the group structure form Active Directory of from the Network Neighborhood.

Unit 2. Protection Management

Chapter 2.1. Basics of Kaspersky Endpoint Security 8.0 This chapter describes the component structure of Kaspersky Endpoint Security, the Trusted zone and protection parameters common for all components, and explains the concepts of policies and tasks and their inheritance. Kaspersky Security Network, a new in-the-cloud approach to the protection, is highlighted.
Chapter 2.2. File System Protection This chapter studies the components that protect the file system, their settings and technologies employed.
Chapter 2.3. Network Protection This chapter is devoted to network and traffic protection, interception technologies and the components responsible for networking protection.
Chapter 2.4. Proactive Defense This chapter represents the components and technologies that prevent or minimize the consequences of infecting the computer with new malware that has not yet been added to Anti-Virus databases or Kaspersky Security Network.
Chapter 2.5. Threat Diagnostics This chapter describes the tools that help the administrator receive information about infected objects detected on client computers, spot weak points of the protection system and adjust the settings correspondingly.
Chapter 2.6. Protection Status Diagnostics This chapter describes statuses, the main tool designed to monitor the protection in general, as well as the selections, reports and statistics associated with them.

Unit 3. Controls

Chapter 3.1. Application Control This chapter is devoted to the components responsible for software control: Application Startup Control and Application Privilege Control. The former restricts program start, the latter regulates the actions taken by the running programs: access to the file system and the registry, and interaction with other programs.
Chapter 3.2. Fixing Vulnerabilities This chapter explains how Kaspersky Security Center helps to find and fix vulnerabilities.
Chapter 3.3. Device Control This chapter demonstrates the centralized use of the Device Control component. Kaspersky Endpoint Security allows the administrator to enforce the corporate security standards, by specifying who, when and which devices can use on the computers.
Chapter 3.4. Web Control This chapter is devoted to the Web Control component that allows constraining users’ access to the Internet in compliance with the organization policy.

Unit 4. Maintenance

Chapter 4.1. Statistics and Reports This chapter describes all the various ways you can find information about virus incidents in Kaspersky Security Center. You will learn how to use events, reports, dashboards, statuses, and repositories, and how to change what you see there.
Chapter 4.2. Updates This chapter explains how Kaspersky Security Center automatically updates Kaspersky Endpoint Security databases and how you can change the settings to accommodate different scenarios.
Chapter 4.3. License Management This chapter explains how Kaspersky licensing works in the case of Kaspersky Endpoint Security and describes how you can use Kaspersky Security Center to distribute license keys to the network computers and to see which computers have which license and when the licenses will expire.
Chapter 4.4. Interaction with User In this chapter you will learn how to protect the anti-virus from the users’ trying to disable or uninstall it, and more generally how you can define which parts and actions of Kaspersky Endpoint Security are visible to users and which are not.
Chapter 4.5. Mobile Computer Management This chapter shows how to define special settings for computers that are temporarily away from the network and cannot connect and report to the Administration Server.
Chapter 4.6. Backup and Restore This chapter describes how to create and more importantly how to restore from a backup copy.

In this course you will find two sorts training materials: slides and demonstrations. Slides mainly explain the principles of how this or that feature works and how you usually use it. Demonstrations specifically show how to do things in Kaspersky Security Center and what the expected results of these doings are. Tutorials show the same actions as demonstrations. The difference between them is that in demonstrations you simply watch whereas in tutorials you have to complete all the actions yourself in a simulated environment. Both the slides and the demonstrations (tutorials) are voiced.

Student Prerequisites

Basic experience with Windows operating systems and networking.

System Requirements

To fully experience this training you need the following:

  • Microsoft Internet Explorer 6.0 or later
  • Flash Player 9 or later
  • Minimum display resolution 1280×960
  • Sound card, speakers or a headphones for listening to voice-over

Kaspersky Lab

Copyright © 1997-2018 Kaspersky Lab
Privacy Policy   |   Contact Us   |   About us

Stay connected