Commercial release of Kaspersky Web Traffic Security 6.1

Commercial release of Kaspersky Web Traffic Security 6.1

19 Dec 2019
Product news

Kaspersky Web Traffic Security 6.1 was released on December 19, 2019. The full version number is

What's new

  • We have modified the distribution kit. Now it includes:
    • Rpm/deb package
    • ISO file containing an operating system image with the pre-installed application (including the proxy server)

    Installation on physical and virtual servers is supported.

  • We have updated the traffic processing rule settings:
    • Rules can now be created outside of groups.
    • New rule type added: bypass rule.
    • Rule priorities outside workspaces no longer used.
    • Default rules no longer used and replaced with the default protection policy.
    • Block action added to protection rules.
    • New criterion added: HTTP method.
  • We have modified the system of roles in the cluster:
    • Worker server and Master server role separation removed.
    • Components for managing application settings and traffic processing combined into a single package (rpm or deb).
  • We have expanded the block page features:
    • New macros added.
    • A separate block page for a workspace can now be configured.
  • We have added integration with Кaspersky Anti Targeted Attack Platform (KATA). Two modes were implemented:
    • Send files from user traffic to KATA (connect KWTS as a KATA external system)
    • Receive information about objects detected by KATA (use information about KATA detections in traffic processing rules)
  • We have added:
    • Time zone configuration and time synchronization of the server over the NTP protocol (only for installation from an ISO file)
    • The "Cryptocurrencies and mining" web category
    • A new object type in protection rules: "Malicious links"
    • Configuration of role-based user access to specific workspaces
  • Reports on application operation events.
  • Detection of phishing and malicious links is now distinguished.
  • Proxy server settings can now be managed in the application web interface (only for installation from the iso file):
    • Connection of trusted load balancers
    • Configuration of authentication on the proxy server
    • Capability to manage SSL connections
    • Configuration of SSL connection processing rules
    • Management of trusted certificates
    • Configuration of the proxy server log settings


How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.