Thank you for choosing our product. We hope that this document will help you in your work and will provide answers
regarding this software product.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal
reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by
applicable law.
Reproduction or distribution of any materials in any format, including translations, is allowed only with the written
permission of Kaspersky Lab ZAO.
This document, and graphic images related to it, may only be used for informational, non-commercial, and personal
purposes.
Kaspersky Lab ZAO reserves the right to amend this document without additional notification. You can find the latest
version of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab ZAO shall not be liable for the content, quality, relevance, or accuracy of any materials used in this
document for which the rights are held by third parties, or for any potential or actual losses associated with the use of
these materials.
This document uses registered trademarks and service marks which are the property of their respective owners.
ABOUT THIS GUIDE ..................................................................................................................................................... 8
In this document ....................................................................................................................................................... 8
ADDITIONAL DATA SOURCES .................................................................................................................................. 10
Information sources for further research ................................ ................................................................................. 10
Discussing Kaspersky Lab applications in web forum ............................................................................................ 11
Contacting the User documentation development group ........................................................................................ 11
STARTING AND STOPPING THE APPLICATION ...................................................................................................... 12
Connection to the Administration Server ................................................................................................................ 21
The utility for selecting the Administration Server service account (klsrvswch) ...................................................... 23
Disconnecting from Server ..................................................................................................................................... 24
Switching between Servers .................................................................................................................................... 25
Adding a Server to the console tree ....................................................................................................................... 25
Granting rights to use a Server ............................................................................................................................... 26
Removing a Server from the console tree .............................................................................................................. 27
Viewing and changing Administration Server settings ............................................................................................ 28
General Administration Server settings ............................................................................................................. 28
Adding a slave Server ....................................................................................................................................... 51
Configuring the connection of the slave Server to the master Server ............................................................... 53
Viewing administration groups of a slave Administration Server ....................................................................... 54
Connecting to the Administration Server via Internet .............................................................................................. 55
MANAGING ADMINISTRATION GROUPS .................................................................................................................. 56
Adding, moving and deleting a group ..................................................................................................................... 56
Creating the structure of administration groups ...................................................................................................... 58
The structure of groups based on the Windows network domains and workgroups ......................................... 59
Group structure based on Active Directory ....................................................................................................... 61
Group structure based on the content of the text file ........................................................................................ 63
Viewing information about a group ......................................................................................................................... 65
Viewing and changing group settings ..................................................................................................................... 66
General settings ................................................................................................................................................ 66
Page 4
R E F E R E N C E G U I D E
4
Granting rights to work with a group ................................................................................................................. 68
Conditions that determine computer status ....................................................................................................... 69
Monitoring of client computer activity ................................................................................................................ 70
Automatic installation of applications on client computers ................................................................................ 72
Creating the list of Update Agents .................................................................................................................... 73
REMOTE MANAGEMENT OF APPLICATIONS .......................................................................................................... 74
Creating a policy ............................................................................................................................................... 74
Displaying inherited policy in the nested group results pane ............................................................................ 77
Viewing and configuring policy settings ............................................................................................................ 77
Activating a policy ............................................................................................................................................. 82
Activating a policy based on an event ............................................................................................................... 83
Policy for mobile user ........................................................................................................................................ 83
Deleting a policy ................................................................................................................................................ 84
Copying a policy ................................................................................................................................................ 84
Configuring the Network Agent's policy ............................................................................................................. 84
Configuring the settings of the Administration Server policy ............................................................................. 88
Exporting a policy .............................................................................................................................................. 93
Importing a policy .............................................................................................................................................. 94
Tasks for specific computers ............................................................................................................................. 96
Creating a group task ........................................................................................................................................ 97
Creating an Administration Server task ........................................................................................................... 108
Creating a task for specific computers ............................................................................................................ 109
Creating a local task ....................................................................................................................................... 110
Viewing and changing task settings ................................................................................................................ 112
Displaying an inherited group task in the results pane of a nested group ....................................................... 118
Automatic operating system loading on the client computers before task execution ...................................... 118
Turning off the computer after the task execution ........................................................................................... 119
Restricting time for the task execution ............................................................................................................ 119
Exporting a task .............................................................................................................................................. 119
Importing a task .............................................................................................................................................. 120
Viewing results of the task execution stored on the Administration Server ..................................................... 122
Configuring the event filter for a group task .................................................................................................... 123
Configuring event filter for a selected computer .............................................................................................. 126
Removing a filter ............................................................................................................................................. 128
Local application settings...................................................................................................................................... 128
Adding computers to group................................................................................................................................... 133
Viewing information about a client computer ........................................................................................................ 134
Page 5
C O N T E N T S
5
Viewing client system information ......................................................................................................................... 138
Administration Server change task ....................................................................................................................... 145
Turning on the client computer ........................................................................................................................ 148
Shutting down the client computer .................................................................................................................. 151
Restarting the client computer ........................................................................................................................ 154
Sending a message to the user of the client computer ......................................................................................... 158
Connecting the client computer to the Administration Server manually. The klmover.exe utility .......................... 161
Client-to-Administration Server connection check frequency................................................................................ 162
Verifying connection of the client computer to Administration Server manually. The klnagchk.exe utility ....... 162
Checking the connection between the client computer and the Administration Server using the
Launching the diagnostics and downloading the results of its operation ......................................................... 168
Starting, restarting and stopping the applications ........................................................................................... 170
REPORTS AND NOTIFICATIONS ............................................................................................................................. 172
Creating a report template .................................................................................................................................... 172
Creating a statistics page ................................................................................................................................ 176
Changing the set of statistics pages ............................................................................................................... 178
Creating an information panel ......................................................................................................................... 179
Changing the set of information panels ........................................................................................................... 183
Viewing and editing report templates .................................................................................................................... 184
Generating and viewing reports ............................................................................................................................ 190
Use NET SEND .............................................................................................................................................. 203
Notification using the executable file to run ..................................................................................................... 204
EVENT AND COMPUTER SELECTIONS .................................................................................................................. 207
Creating an event selection............................................................................................................................. 208
Customizing an event selection ...................................................................................................................... 209
Saving information about events to file ........................................................................................................... 213
Viewing and changing the settings for Windows network polling .................................................................... 226
Viewing and modifying Active Directory group properties ............................................................................... 228
Viewing and modifying the settings for IP subnet polling ................................................................................ 229
Viewing and changing domain settings ................................................................................................................ 230
Creating an IP subnet ........................................................................................................................................... 232
Viewing and modifying the IP subnet settings ...................................................................................................... 233
Viewing and modifying the Active Directory group properties ............................................................................... 236
Creating the task of downloading updates to the repository ................................................................................. 237
Adding an update source ................................................................................................................................ 240
Configuring connection to the update servers ................................................................................................. 243
Determining the updates list............................................................................................................................ 245
Configuring other update task settings ............................................................................................................ 247
Automatic distribution of updates .......................................................................................................................... 253
Automatic distribution of updates to the client computers ............................................................................... 253
Automatic distribution of updates to the slave Servers ................................................................................... 253
Automatic installation of updates to program modules .................................................................................... 253
Creating the list of Update Agents and configuring the agents ....................................................................... 254
The task of downloading updates by the Update Agents ................................................................................ 256
Viewing information about installed licenses ........................................................................................................ 259
Installing a license ................................................................................................................................................ 262
Running the license installation task creation wizard ............................................................................................ 263
Creating and viewing report on licenses ............................................................................................................... 263
Obtaining license using activation code ................................................................................................ ................ 264
Automatic distribution of license ........................................................................................................................... 265
ADDITIONAL FEATURES .......................................................................................................................................... 277
Monitoring anti-virus protection status using system registry data ........................................................................ 277
Mobile users ......................................................................................................................................................... 278
Creating a profile for the mobile users ............................................................................................................ 279
Creating the Network Agent switching rule ..................................................................................................... 282
Adding a condition to the rule.......................................................................................................................... 283
Searching for administration groups ............................................................................................................... 295
Searching for the slave Administration Servers .............................................................................................. 297
Data backup ......................................................................................................................................................... 299
Data backup task ............................................................................................................................................ 300
Data backup and restoration utility klbackup ................................................................................................... 302
REFERENCE INFORMATION ................................................................................................................................... 313
Context menu ....................................................................................................................................................... 313
Statuses of computers, tasks and policies ............................................................................................................ 321
KASPERSKY LAB ZAO ............................................................................................................................................. 327
INDEX ................................................................................................ ................................................................ ........ 328
Page 8
8
ABOUT THIS GUIDE
IN THIS SECTION
In this document ................................................................................................................................................................ 8
This Guide contains the purpose of Kaspersky Administration Kit and step by step descriptions of the features it offers.
The basic concepts and general schemes for working with the application are described in the Kaspersky Administration
Kit Administrator's Guide.
IN THIS DOCUMENT
The following sections are included in the document:
Additional data sources (see page 10). The section tells you how to get information about the application apart
from the documentation included in the distribution package.
Starting and stopping the application (see page 12). The section tells you how to start Kaspersky Administration
Kit.
Quick Start Wizard (see page 13). This section describes the initial configuration steps used to build the anti-
virus protection management system using Kaspersky Administration Kit.
Managing Administration Servers (see page 21). This section contains data on operations with Administration
Server in Kaspersky Administration Kit.
Managing Administration groups (see page 56). This section presents the operating layout of Kaspersky
Administration Kit and administration groups.
Managing applications remotely (see page 74). This section describes remote application management using
Kaspersky Administration Kit.
Client computers (see page 133). The section contains information on client computer management when
working with Kaspersky Administration Kit.
Reports and notifications (see page 172). This section describes the peculiarities of managing reports and
notifications in Kaspersky Administration Kit.
Event and computer selections (see page 207). This section contains data on how to monitor anti-virus
protection system using Kaspersky Administration Kit.
Unassigned computers (see page 225). This section describes main issues related to corporate network
computers not included in administration group.
Update (see page 237). This section covers the procedures for updating the databases and program modules
managed via Kaspersky Administration Kit.
Managing licenses (see page 259). This section contains data on centralized licenses management using
Kaspersky Administration Kit services.
Repositories (see page 266). This section describes operations with objects used to monitor the status of client
computers and perform their maintenance.
Page 9
A B O U T T H I S G U I D E
9
SAMPLE TEXT
DOCUMENT CONVENTIONS DESCRIPTION
Note that...
Warnings are highlighted in red and enclosed in frames. Warnings contain
important information: for example, information related to operations critical to
computer safety.
It is recommended to use...
Notes are framed in dotted-line box. Notes contain additional detail and
reference information.
Example:
...
Example blocks have a yellow background, and the heading "Example".
Update means...
New terms are italic.
ALT+F4
Names of keyboard keys are bold and are all uppercase.
Names of the keys followed by a plus sign (+) indicate a combination of keys.
Enable
Names of interface elements are bold; for example, input fields, menu
commands, and buttons.
To configure a task schedule:
Procedure headings are italic.
help
Text in the command line and text of messages displayed on the screen have a
special font.
<IP address of your computer>
Variables are enclosed in angle brackets. Instead of a variable, the
corresponding value must be entered in each case; angle brackets are omitted.
Additional features (see page 277). This section describes some additional features of Kaspersky Administration
Kit designed to extend the opportunities for centralized management of applications in computer networks.
Reference information (see page 313). This section contains reference information about the context menu
items of the Administration Console objects, results pane objects and the meaning of statuses assigned to
network objects and administration groups.
Glossary. The section enumerates the terms used in the document.
Kaspersky Lab ZAO (see page 327). The section provides information on Kaspersky Lab ZAO.
Index. Using this section, you can easily find the required data in the document.
DOCUMENT CONVENTIONS
Document conventions used in this document are described in the following table.
Table 1. Document conventions
Page 10
10
ADDITIONAL DATA SOURCES
IN THIS SECTION
Information sources for further research ......................................................................................................................... 10
Discussing Kaspersky Lab applications in web forum ..................................................................................................... 11
Contacting the User documentation development group ................................................................................................ 11
If you have any questions regarding purchasing, installing or using Kaspersky Administration Kit, answers are readily
available.
Kaspersky Lab provides various sources of information about the application. You can choose the most suitable,
according to the importance and urgency of your question.
INFORMATION SOURCES FOR FURTHER RESEARCH
You can view the following sources of information about the application:
the application's page on Kaspersky Lab website;
the application's Knowledge Base page on the Technical Support Service website;
online help system;
documentation.
The application's page at the Kaspersky Lab website
http://www.kaspersky.com/administration_kit
This page provides you with general information about the application's features and options.
The application's Knowledge Base page at the Technical Support Service website
http://support.kaspersky.com/remote_adm
This page contains articles published by the experts of the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and
cover purchasing, installing and using Kaspersky Administration Kit. The articles are sorted by subject, such as
"Working with key files", "Updating databases" and "Troubleshooting". The articles aim to answer questions about
not only Kaspersky Administration Kit but other Kaspersky Lab products as well. They may also contain news from
the Technical Support Service.
Online help system
The application installation package includes full help files, which contain step by step descriptions of the
application's features.
To open the help file, select Kaspersky Administration Kit help system in the console Help menu.
Page 11
A D D I T I O N A L D A T A S O U R C E S
11
If you have a question about a specific application window, you can use context help.
To open context-sensitive help, in the corresponding window, click the Help button or the F1 key.
Documentation
The documentation supplied with the application aims to provide all the information you will require. It includes the
following documents:
Administrator's Guide describes the purpose, basic concepts, features and general schemes for using
Kaspersky Administration Kit.
Implementation Guide contains a description of the installation procedures for the components of Kaspersky
Administration Kit as well as remote installation of applications in computer networks using simple configuration.
Getting Started provides a step by step guide to anti-virus security administrators, enabling them to start using
Kaspersky Administration Kit quickly, and to deploy Kaspersky Lab anti-virus applications across a managed
network.
Reference Guide contains an overview of Kaspersky Administration Kit, and step by step descriptions of its
features.
The documents are supplied in .pdf format in Kaspersky Administration Kit's distribution package.
You can download the documentation files from the application's page on Kaspersky Lab website.
The information about an application programming interface (API) of Kaspersky Administration Kit is contained in the
klakaut.chm file. This file is located in the installation folder of the application.
DISCUSSING KASPERSKY LAB APPLICATIONS IN WEB
FORUM
If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in
our forum at http://forum.kaspersky.com.
In this forum you can view existing topics, leave your comments, create new topics and use the search engine.
CONTACTING THE USER DOCUMENTATION DEVELOPMENT
GROUP
If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment,
please contact our User documentation development group.
Click the Send feedback link located in the top right part of the window to open the computer's default mail client. In the
window that opens, the email of User documentation development group will appear (docfeedback@kaspersky.com),
with the subject line – "Kaspersky Help Feedback: Kaspersky Administration Kit". Write your comment and send the
letter without changing the subject.
Page 12
12
STARTING AND STOPPING THE
APPLICATION
Kaspersky Administration Kit starts automatically when launching the Administration Server.
The Kaspersky Administration Kit can be launched by selecting Kaspersky Administration Kit from the Kaspersky
Administration Kit program group in the standard Start Programs menu. This program group is created only on
administrator's workstations during the Kaspersky Administration Console installation.
To access the functionality of Kaspersky Administration Kit the Administration Server of Kaspersky Administration Kit
must be running.
Page 13
13
QUICK START WIZARD
IN THIS SECTION
Step 1. Adding a license.................................................................................................................................................. 13
Step 6. Completing the wizard ........................................................................................................................................ 20
The Wizard configuring can configure the minimum settings for centralized management of anti-virus protection.
The wizard opens at the first connection to an Administration Server established after installation.
STEP 1.ADDING A LICENSE
During this stage, the method of adding a license for the applications (see the figure below) that will be managed by the
administrator using Kaspersky Administration Kit should be selected.
Figure 1. Selecting the method of adding a license
Page 14
R E F E R E N C E G U I D E
14
Select the method of adding a license:
Enter activation code – you will be asked to specify the code obtained when you purchased a commercial
version of the application (see the figure below).
Figure 2. Entering the activation code
If you wish to automatically apply the license to the computers in the administration groups, check the box in the
corresponding field.
Page 15
Q U I C K S T A R T W I Z A R D
15
Load from key file – you will be asked to specify the key file (see the figure below).
Figure 3. Selecting the key file
If you wish to automatically apply the license to the computers in the administration groups, check the box in the
corresponding field.
Add license later. A license can be installed later using the license installation task (see section "Installing a
license" on page 262).
Page 16
R E F E R E N C E G U I D E
16
STEP 2.NETWORK DISCOVERY
During this stage the computer network is polled, and computers within this network are identified (see the figure below).
Based on the results of this scan, a service group Unassigned computers is formed together with its Domains, Active
Directory and IP subnets subfolders. The information obtained will be used to automatically create the administration
groups.
Figure 4. The Quick Start Wizard window. Network Discovery
To view the structure of the computer network, use the View discovered computers link. Click the View Kaspersky
Administration Kit introduction link to view the description of the main features offered by Kaspersky Administration
Kit.
Page 17
Q U I C K S T A R T W I Z A R D
17
STEP 3.CONFIGURING NOTIFICATION SETTINGS
During the next stage you will have to configure the settings for delivery of email notifications generated by Kaspersky
Lab applications.
Figure 5. Configuring delivery of notifications
If the SMTP server uses authorization, check the Use ESMTP authorization box and fill in the User name, Password
and Confirm password fields. These settings will be used as the default settings for application policies.
To check the correctness of the specified settings, press the Test button. This will open a test notification sending
window. In the event of errors, detailed error information will be displayed in it.
STEP 4.CONFIGURING ANTI-VIRUS PROTECTION
During this stage, you should configure the anti-virus protection system (see the figure below).
The Quick Start Wizard creates an anti-virus protection system for the client computers within administration groups,
using Kaspersky Anti-Virus 6.0 for Windows Workstations MP4. In this case, the Administration Server creates a policy
and defines a minimum set of tasks for the highest hierarchy level of Kaspersky Anti-Virus 6.0 for Windows Workstations
MP4, as well as downloading updates and data backup.
The objects created by the Wizard are displayed in the console tree:
the policies for Kaspersky Anti-Virus for Windows Workstations and Kaspersky Anti-Virus 6.0 for Windows
Servers MP4 – in the Policies folder of the Managed computers group under the names Protection policy - Windows Workstations and Protection policy - Windows Servers, and with the default settings;
the tasks for updating the anti-virus database for Kaspersky Anti-Virus for Windows Workstations and
Kaspersky Anti-Virus 6.0 for Windows Servers MP4 – in the Group tasks folder of the Managed computers
group under the names Update – Windows Servers and Update – Windows Workstations, and with the
default settings;
Page 18
R E F E R E N C E G U I D E
18
on-demand scanning tasks for Kaspersky Anti-Virus for Windows Workstations and Kaspersky Anti-Virus 6.0 for
Windows Servers MP4 – in the Group tasks folder of the Managed computers group under the names Virus Scan – Windows Workstations and Virus Scan – Windows Servers, and with the default settings;
downloading updates to the repository – in the Kaspersky Administration Kit tasks folder under the name
Download updates to repository, and with the default settings;
the Administration Server data backup task – in the Kaspersky Administration Kit tasks folder under the
name Administration Server data backup, and with the default settings.
A policy for Kaspersky Anti-Virus 6.0 for Windows Workstations MP4 is not created if a policy for that application already
exists in the Managed computers folder. If group tasks for the Managed computers group and the Download updates to repository with these names already exist, they are not created either.
The wizard window displays the process of creating the tasks and the policies. If errors occur, an error message will be
displayed on the screen.
Figure 6. Configuring anti-virus protection
Page 19
Q U I C K S T A R T W I Z A R D
19
STEP 5.DOWNLOADING UPDATES
During this step the wizard downloads updates to the repository by the Administration Server: the task defines the list of
files for download and downloads them (see the figure below).
Figure 7. Configuring retrieval of updates
You don't need to wait for completion of the updates retrieval task. The downloading of updates will continue using the
Download updates to the repository task (see section "Determining the updates list" on page 245).
Page 20
R E F E R E N C E G U I D E
20
STEP 6.COMPLETING THE WIZARD
When the Quick Start Wizard completes, you will be invited to start the deployment of anti-virus protection. You can use
this wizard to install the Network Agent. If you do not wish to install applications immediately after the Quick Start Wizard
completion, uncheck the Start deployment box (see the figure below).
Figure 8. Completing the Quick Start Wizard
A detailed description of how to work with the Remote Install Wizard is provided in the Implementation Guide.
Page 21
21
MANAGING ADMINISTRATION SERVERS
IN THIS SECTION
Connection to the Administration Server ......................................................................................................................... 21
The utility for selecting the Administration Server service account (klsrvswch) ............................................................... 23
Disconnecting from Server .............................................................................................................................................. 24
Switching between Servers ............................................................................................................................................. 25
Adding a Server to the console tree ................................................................................................................................ 25
Granting rights to use a Server ....................................................................................................................................... 26
Removing a Server from the console tree ....................................................................................................................... 27
Viewing and changing Administration Server settings ................................................................ ..................................... 28
Connecting to the Administration Server via Internet ...................................................................................................... 55
The Administration Server is a computer on which the Administration Server component is installed. A corporate
network can include several such Servers. The following operations are supported for the Administration Servers:
connection / disconnection;
adding / removal from the console tree;
switching between the Administration Servers;
building an Administration Servers hierarchy;
creation and configuration of tasks for delivery of reports, updating and backup copying.
CONNECTION TO THE ADMINISTRATION SERVER
To connect to an Administration Server,
select the node corresponding to the required Administration Server in the console tree.
After this, the Administration Console tries to connect to the Administration Server. If there are several Administration
Servers on your network, the Console will connect to the server it last connected to during the previous Kaspersky
Administration Kit session. When the application is launched for the first time after installation, it is assumed that the
Administration Server and Administration Console are running on the same computer. Therefore, the Administration
Console will try to detect the Administration Server on this computer.
If the Server is not found, you will be asked to specify the Server address manually in the Connection settings dialog
box (see the figure below). Enter the required Server address in the Server address field. You can enter either the IP
address or the computer name in the Windows network.
Page 22
R E F E R E N C E G U I D E
22
To connect to the Administration Server through a port that differs from the default one, enter <Server name>:<Port> in
the Server address field.
Figure 9. Connecting to the Administration Server
Press the Advanced button to show or hide the following advanced connection settings:
Use SSL connection. Check this box to transmit data between the Administration Server and Administration
Console via the Secure Sockets Layer protocol (SSL). Uncheck this box if you do not want to communicate via
SSL. However, this will lower the security of data transmissions against modification or interceptions.
Use data compression. Check this box to increase the rate of data transfer between the Administration
Console and the Server, by decreasing the amount of information being transferred and hence lowering the load
on the Administration Server.
Enabling this setting will increase the load on the central processor of the computer which is hosting the
Administration Console.
Use proxy server. Check this box if you want to connect to the Administration Server via a proxy server (see
the figure above). Enter the address for connecting to the proxy server in the Address field. Fill in the User name and Password fields if user authorization is required to access this proxy server.
When the connection settings have been confirmed, the Administration Console verifies the user's rights to connect to
the Administration Server. If the secure connection is SSL-enabled, the Administration Console authenticates the
Administration Server before verifying user rights.
When you connect to the server for the first time, and also if the server certificate for this session differs from your local
copy, a request to connect to the server and receive a new certificate will be displayed (see the figure below). Select one
of the following:
I want to connect to the server and download the certificate from it – to connect to the Administration
Server and receive a new certificate.
I want to specify the certificate file location – specify the Server certificate manually. In this case, select the
certificate file using the Select button. The certificate file has the extension .cer, and is located in the Cert
subfolder of the Kaspersky Administration Kit program folder specified during application installation. The
Console will attempt to re-authenticate the server using the certificate you specified.
Page 23
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
23
You can copy the certificate file to a shared folder or a floppy disk. A copy of this file can be used to configure
access settings for the Server.
Figure 10. Request to connect to the Administration Server
User rights are verified using the Windows user authentication procedure. If the user is not authorized to access the
Administration Server, i.e. he/she is not an operator (KLOperators) or administrator of Kaspersky Administration Kit
(KLAdmins), he/she will be asked to register to access the Administration Server (see the figure below). In the
corresponding form, specify a user account (name and password) which has Kaspersky Administration Kit operator or
administrator rights.
Figure 11. Registering a user to access the Administration Server
If the connection to the Administration Server has been established successfully, the structure of this Server's folders and
its settings appear in the console tree.
THE UTILITY FOR SELECTING THE ADMINISTRATION
SERVER SERVICE ACCOUNT (KLSRVSWCH)
You can use this utility to specify an account for launching the Administration Server service on this computer (see the
figure below). Launch the utility and select one of the two following options:
Local System account – the Administration Server will start using the Local System account and its
credentials.
Page 24
R E F E R E N C E G U I D E
24
Correct operation of Kaspersky Administration Kit requires that the account used to start the Administration
Server should have the administrator's rights on the resource where the Administration Server database is
hosted.
Specified account – the Administration Server will start using the account included in a domain. In this case
the Administration Server will initiate all operations using the credentials of that account. Use the Find now
button to select the user whose account will be used and enter the password.
If the domain user account is selected as an account for launching the Administration Server, you will be asked
to define this user and specify the password for his/her account.
Figure 12. Selecting account
When using the SQL-server in the Windows authentication mode, the user account should be provided with an access to
the database. The user account should be the owner of the Kaspersky Anti-Virus database. By default, the dbo scheme
must be used.
DISCONNECTING FROM SERVER
To disconnect from an Administration Server:
1. In the console tree, select the node corresponding to the Administration Server that should be disconnected.
2. Open the context menu.
3. Select the Disconnect from Administration Server command.
Page 25
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
25
SWITCHING BETWEEN SERVERS
If several Administration Servers have been added to the console tree, you can switch between those servers while
working with them.
To switch to another Administration Server:
1. Select in the console tree the node under the necessary Server name.
2. Open the context menu and select the Connect to Administration Server command.
In the Connection settings window that opens, enter the name of the Server, which you intend to manage, and
specify the necessary settings for connection to the server (see section "Connecting to Server" on page 21).
If you have no Kaspersky Administration Kit operator or administrator rights, access to the Administration Server
will be denied.
Figure 13. Connecting to the Administration Server
3. Press the OK button to complete switching between the Servers.
If the connection to the Server has been established successfully, the contents of the corresponding node will be
updated.
ADDING A SERVER TO THE CONSOLE TREE
To add a new Administration Server to the console tree:
1. Select the Kaspersky Administration Kit node in the console tree within the main program window of
Kaspersky Administration Kit.
2. Open the context menu and select the New Administration Server command.
Page 26
R E F E R E N C E G U I D E
26
This will create a new node with the name Kaspersky Administration Server - <Computer name> (Not
connected) in the console tree. Use this node to connect to any other Administration Server installed on the
network.
GRANTING RIGHTS TO USE A SERVER
To grant rights to work with an Administration Server:
1. In the main Kaspersky Administration Kit application window select the node corresponding to the required
Administration Server in the console tree, open its context menu and select the Properties command.
2. In the Administration Server <Computer name> properties window that opens (see the figure below), switch
to the Security tab.
Whether this tab is shown or hidden is determined by the user interface settings. To display the tab, navigate to the
ViewConfiguring interface menu and check the box in the Display security settings tabs string.
The upper part of the tab displays a list of users and user groups that have access to the Administration Server. The
lower part contains the list of possible permissions:
All – includes all permissions (see below).
Reading – viewing Kaspersky Administration Kit objects' properties without a permission to perform operations,
create new objects or modify the existing ones.
Figure 14. Granting rights to access the Administration Server
Page 27
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
27
Writing – changing Kaspersky Administration Kit object properties, as well as creating new objects without a
right to perform operations upon objects.
Running – performing operations on Kaspersky Administration Kit objects without a right to create new objects
or modify the existing ones.
Modify access privileges – granting to users, and groups of users, access rights to the functionality of
Kaspersky Administration Kit.
Edit event log settings.
Edit notification settings.
Remote install of Kaspersky Lab applications.
Remote install of external applications – preparation of installation packages and remote install of third-party
applications and Kaspersky Lab applications to the client computers.
Edit Administration Server hierarchy settings.
Save network lists content – copy files from backup, quarantine and unprocessed files from client computers
to a computer where the Administration Console is installed.
Create tunnels – creating a tunneling connection between the computer where the Administration Console is
installed and a client computer.
To connect to the Administration Server, the user should have Read permissions.
To assign the rights for working with Server, perform the following actions:
1. Select a group of users.
2. In the Allow column check the boxes next to the permissions provided to members of that group. If you check
the All box, all the boxes in the column will automatically be checked.
3. In the Deny column check the boxes next to the permissions that must not be provided to members of that
group. If you check the All box, all the boxes in the column will automatically be checked.
You can add a new group or a new user, using the Add button. You can only add groups of users and users that are
registered on the computer with the Administration Console installed.
To remove a group or a user, select an object from the list and click the Remove button.
The group of Kaspersky Administration Kit administrators (KLAdmins) cannot be removed.
Click the Apply or OK button to apply the settings.
REMOVING A SERVER FROM THE CONSOLE TREE
To remove an Administration Server from the console tree:
1. Select the node corresponding to the required Administration Server in the console tree.
2. Open the context menu.
3. Select the Delete command.
Page 28
R E F E R E N C E G U I D E
28
VIEWING AND CHANGING ADMINISTRATION SERVER
SETTINGS
The links in the task pane of the Administration Server allow fast access to the following server features:
installation of anti-virus protection;
organization of administration groups;
configuration of update, protection and scanning settings;
viewing of statistics and configuration of notifications.
You can use the Administration Server properties window to view its parameters and modify them as necessary.
To open the Server properties window:
1. Select the necessary Server in the console tree.
2. Open the context menu and select the Properties option.
The window that opens contains a set of tabs, on which you can view and modify the following Administration
Server settings:
connection to the Administration Server (see section "General Administration Server settings" on page 28);
granting rights to access the Administration Server (see section "Granting rights to use a Server" on
page 26);
registration of events (see section "Event processing settings" on page 37);
relocation of computers (see section "General guidelines for relocation of computers" on page 46);
traffic limit for IP ranges and IP subnets (see section "Traffic limit rules" on page 51);
configuring the Virus outbreak event (see section "Virus outbreak event settings" on page 44);
configuring interaction with Cisco NAC (see section "Configuring Integration with Cisco Network Admission
Control (NAC)" on page 49).
GENERAL ADMINISTRATION SERVER SETTINGS
You can configure the general Administration Server settings on the General, Settings and Security tabs.
The General tab (see the figure below) contains the following information:
name of the component (Administration Server) and the computer name within the Windows network on which
this component is installed;
Page 29
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
29
version number of the installed application.
Figure 15. Viewing the Administration Server properties. The General tab
Viewing the Administration Server properties. The General tab
Clicking the Advanced link opens a window containing the following information (see the figure below):
Path to the shared folder used for storing application deployment files and the updates downloaded from
the update source to the Administration Server. You can edit the path to the shared folder using the Modify
button.
Page 30
R E F E R E N C E G U I D E
30
The Administration Server operation statistics hyperlink is used to open the window which displays
general statistics about the Administration Server.
Figure 16. Administration Server properties. The Advanced window
Use the Information about the Administration Server plug-in link to open the plug-in properties window
(see the figure below). This window displays the following information:
Name and full path to the plug-in file.
File version.
Information about the manufacturer (Kaspersky Lab) and copyright information.
Page 31
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
31
Date and time of the management plug-in file creation.
Figure 17. The properties of the application plug-in window
Page 32
R E F E R E N C E G U I D E
32
Using the Information about the plug-ins installed for the application link, you can open a window that
contains the list of plug-ins installed on the Administration Server (see the figure below). For each plug-in
the application name and plug-in versions are provided. In this window you can view detailed information
about the selected application management plug-in by clicking the Information button.
Figure 18. The list of application management plug-ins installed on the Administration Server
Clicking the Current database information link opens the current database properties window (see the
figure below) containing the following data:
name of the database server used;
name of the database service use occurrence;
Page 33
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
33
database name.
Figure 19. Viewing information about the database
Clicking the Settings button in the Administration Servers hierarchy section opens the Administration
Server hierarchy configuration window (see the figure below). In this window you can:
Specify whether this Administration Server is a slave server by checking This Administration Server
is a slave server in the server hierarchy box.
Specify the address and port of the master Administration Server in the Address field.
Specify or modify the path to the master Administration Server certificate using the Select button.
Set proxy server parameters to connect to the master Administration Server.
These settings cannot be modified if the current Administration Server policy does not have the option to
Allow hierarchy settings modification on slave servers checked.
Page 34
R E F E R E N C E G U I D E
34
Figure 20. Configuring the slave Administration Server's connection to the master Administration Server
The Settings tab (see the figure below) contains the Administration Server settings. The Administration Server
connection settings group of fields contains port numbers through which the following connections are established:
Connection to the Administration Server. The default port number is 14000 but if this port is in use, you can
change it.
Secure connection to the Administration Server using SSL protocol. By default, port 13000 will be used.
Connection of mobile devices to the Administration Server. The default port number is 13292. To enable this
port on the Administration Server, check the Open port for mobile devices box.
You can also use the corresponding field to specify the maximum number of events stored in the database on
the Administration Server.
In the Computer visibility timeout (min) field of the Computer visibility on the network section, you can
specify the time during which a client computer will be considered visible in the network after it was
disconnected from the Administration Server. The default interval is 60 minutes. After the specified period
expires, the Administration Server will consider the client computer inactive.
Page 35
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
35
These parameters can be redefined, if necessary.
Figure 21. Viewing the Administration Server properties. The Settings tab
Page 36
R E F E R E N C E G U I D E
36
The Security tab is used (see the figure below) to configure the rights to access the Administration Server (see section
"Granting rights to use a Server" on page 26).
Figure 22. Granting rights to access the Administration Server
Whether this tab is shown or hidden is determined by the user interface settings. To display the tab, navigate to the
ViewConfiguring interface menu and check the box in the Display security settings tabs string.
Page 37
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
37
EVENT PROCESSING SETTINGS
The rules for handling runtime Administration Server events are displayed on the Events tab (see the figure below).
Figure 23. Viewing the Administration Server properties. The Events tab
For the Administration Server, as well as for other Kaspersky Lab applications managed via Kaspersky Administration
Kit, events can have one of the four severity levels: Critical event, Error, Warning, and Info.
According to the severity level, events are distributed in the following way:
Critical event:
The license restriction for this license has been exceeded. For example, the client computer on which the
license is installed, exceeds the restriction on the number of computers specified in it.
Virus outbreak - virus activity in administration groups exceeds the preset limit.
Connection with client computer lost ( unable to establish connection with the Network Agent installed on
the client computer).
Host status is Critical (a computer with settings matching the status Critical has been detected within the
network).
Error:
No free space on hard drive - there is no free space on the disk where the Administration Server saves
operational information.
Page 38
R E F E R E N C E G U I D E
38
The shared folder is not available - the shared folder containing updates of the anti-virus database and
application modules is unavailable.
The Administration Server information database is unavailable.
There is no space in the Administration Server information database.
An error occurred while copying updates to the specified folder.
Warning:
License restriction for the key is exceeded.
The computer has remained inactive in the network for too long.
Conflict of computer names - the uniqueness of client names within one hierarchical level is violated.
Volumes are almost full - little or no free space is left on the hard drives.
There is little free space in the Administration Server information database.
Host status is Warning (a computer with settings matching the Warning status has been detected within the
network).
Disconnected from the master Administration Server.
Disconnected from the slave Administration Server.
Incompatible application was installed.
Info.
The number of clients using the license is over 90% of the maximum number allowed in the license.
New computer is found - network polling has found a new client.
Client computer was automatically added to group - a new client has been automatically included in a group
in accordance with the Unassigned computers group settings.
This client computer has been inactive for too long and is removed from the group.
Connection to the slave Administration Server is established.
Connection to the master Administration Server is established.
Monitored application from the applications registry has been installed.
Updates are copied successfully to the specified folder.
Audit: Connection to the Administration Server.
Audit: Object modified.
Event handling rules are defined separately for each severity level.
1. Select the event importance level from the drop-down list: Critical, Error, Warning or Info.
Audit: Object status modified.
Audit: Group settings modified.
Page 39
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
39
2. Events corresponding to the selected severity level will be displayed in the table below. The list of events is
specific to each application. For more information about events, see the application documentation. Select the
types of events to be recorded using the Shift and Ctrl keys on your keyboard. Click the Select All button to
select all event types.
3. Then click the Properties button for the selected event types.
4. To record event information in event logs, check the following boxes in the Event registration section
(see the figure below):
On Administration Server for (days) box to make the Administration Server log application events that
occur on all clients in the group in a centralized manner. In the field on the right, specify the number of days
during which the server will store information. When the specified period has elapsed, the entry
corresponding to this event will be deleted.
You can view event logs stored on the Administration Server through the Administration Console on the
administrator workstation. Such information is shown in the Events folder of the console tree.
In the event log on client computer to save information about events locally in the Windows Event Log of
each client computer.
In the event log on Administration Server to enable centralized logging of all application events on all
clients in this group in the specified Administration Server's Windows Event Log.
The information in Windows event logs can be viewed using Displays client computer events, a standard
Windows event management tool.
Figure 24. Editing event properties
5. To enable notification about selected events, specify the notification methods by checking appropriate columns
in the Event notification section:
Notify by email;
Page 40
R E F E R E N C E G U I D E
40
Notify through NET SEND;
Notification using NET SEND is not available in Microsoft Windows Vista and later versions.
Notify by running executable or script;
Notify via SNMP.
Notify via SNMP is configured directly in the application working with SNMP.
To configure notifications, use the Settings link and in the window that opens (see the figure below) define the
settings.
In the upper part of the window select the notification method that you wish to modify. If the Use Administration Server settings box is checked, the values specified on the Notification tab under the Administration Server properties are
used by default. To modify notification settings, uncheck the Use Administration Server settings box and select one of
the following items from the drop-down list:
Email (see the figure above). In this case enter the following data:
Figure 25. Configuring event notifications
In the Recipient field, specify the email address of the notification recipient. Several addresses may be
entered as a list separated by commas or semicolons.
In the SMTP server field, specify the address of the mail server connection (an IP address or a Windows
network name can be used);
Page 41
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
41
In the SMTP server port field, specify the SMTP server connection port number (the default is port 25);
the sender and subject for the message that will be delivered as a notification. To do this, press the
Properties button and in the window that opens (see the figure below), fill in the Subject field. In the lower
entry field, specify the email address which will be used as a sender's address. In the same window, enter
User name, Password, and Confirm password in the relevant fields if ESMTP authorization is being
used.
Figure 26. Configuring notification settings. Specifying the Sender and Subject
Page 42
R E F E R E N C E G U I D E
42
NET SEND (see the figure below). Under this option, use the field below to enter recipient host addresses for
network notifications. An IP address or a Windows network name may also be used. Several addresses may be
entered as a list separated by commas or semicolons. For successful notification, a messaging service
(Messenger) must be installed on the Administration Server and on all recipient computers.
Figure 27. Configuring notifications. Notification using NET SEND
Executable file to run (see the figure below). Under this option, use the Select button to select an executable
module to run when an event occurs.
Page 43
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
43
Executable environment variable names are the same as the names of placeholders used to create the
message text (see below).
Figure 28. Configuring notifications. Notification using executable files
Enter the message which will be delivered as notification in the Notification message section at the bottom of the
window (see the figure above). If the Use Administration Server settings box is checked, the message text specified
on the Notification tab of the Administration Server settings will be used by default. To modify the message, uncheck
the Use Administration Server settings box and enter a new message.
The notification text may include information about the event recorded. Enter appropriate placeholders by selecting them
from the drop-down list accessible by clicking the button .
Event severity;
From computer;
Domain;
Event;
Event description;
Time raised;
Task name;
Application;
Page 44
R E F E R E N C E G U I D E
44
Version number;
IP-address;
IP address of the connection.
To check the correctness of the settings specified on this tab, you can send a test message manually. To do this, press
the Test button. This will open a test notification sending window (see the figure below). In the event of errors, detailed
error information will be displayed in it.
Figure 29. Configuring notification settings. Sending a test notification
VIRUS OUTBREAK EVENT PARAMETERS
On the Virus outbreak tab (see the figure below) you can set the maximum number of viruses found within a certain
time interval after which new detected virus instances will be considered a Virus outbreak event. This property is
important during periods of virus outbreaks since it enables administrators to react in a timely manner to virus attack
threats.
Check the desired application types:
Anti-virus for workstations and file servers;
Perimeter defense anti-virus;
Mail system anti-virus.
Set the virus activity threshold for each application type which when exceeded will trigger a Virus outbreak event:
In the Viruses field – the number of viruses found within by the applications of that type.
Page 45
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
45
In the in (min) field – time during which the specified number of viruses was detected.
Figure 30. Viewing the Administration Server properties. The Virus outbreak tab
Page 46
R E F E R E N C E G U I D E
46
Click the Configure policies to activate on "Virus outbreak" event link to open the Policy activation window (see the
figure below), and create a list of policies to be used by applications as active policies on "Virus outbreak" event in
administration groups. To do this, use the Add or Delete buttons.
GENERAL GUIDELINES FOR RELOCATION OF COMPUTERS
You can use the Computer relocation tab (see the figure below) to specify the rules for relocation of network computers
to specified administration groups.
Figure 31. Configuring policies to activate on virus outbreak
Page 47
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
47
The order of rules in the Computer relocation rule list section determines a rule's application priority. To delete or
move a rule in the list, use the corresponding buttons to the right.
Figure 32. The Administration Server properties window. The Computer relocation tab
To review or modify the settings of an existing rule, click the Properties button.
Page 48
R E F E R E N C E G U I D E
48
To add a rule, press the Add button. Use the displayed window (see the figure below) to enter the following rule settings:
Figure 33. The properties window of a rule for computer relocation. The General tab
On the General tab specify the following settings:
name of the rule;
group to which computers will be moved in accordance with the rule;
rule application order:
Run once for each computer, if the rule must be applied to each host only once.
Run once for each computer then at every Network Agent install on computer.
Rule works permanently.
On this tab check the following boxes:
Move only computers not added to administration groups – if computers already included in administration
groups must not be relocated to other groups in accordance with the rule;
Enable rule – to apply the rule during the operation.
Use the Network tab to specify the criteria that a computer must comply with to be relocated to the selected
administration group:
Computer name in the Windows network.
Page 49
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
49
Domain.
Computer domain name.
DNS domain.
If a computer IP address must be within a certain IP range, check the IP address range box and specify the
upper and lower values of the range.
If IP address to connect to server is considered while the computer is running, check the corresponding box
and specify the upper and lower values of the range, which must include the connection IP address.
Check the Computer is in IP subnet box and press the Select button to specify the IP subnet to which the host
must belong. IP-ranges are selected from the list of ranges contained in the Unassigned computers folder of
the console tree.
Use the Active Directory tab to perform the following actions:
If a computer must belong to a specific Active Directory unit, check the Computer is located in Active
Directory organization unit box and press the Select button to select the Active Directory group. Active
Directory organization units are selected from the list of groups displayed in the Unassigned computers folder.
To process computers included in nested organization units, check the Computer is member of Active
Directory group box.
Use the Applications tab to select the following from the drop-down lists:
criteria of the presence of the Network Agent running on the computer: Installed or Not installed;
version of the operating system that must be installed on the computer.
For criteria, which should not be considered in a rule, uncheck their corresponding boxes and leave their fields empty.
A host will be moved to an administration group if it matches all the criteria defined in a rule.
To apply created rules, press OK.
If you wish to forcibly apply the rule, irrespective of the applied rules, select the necessary rule and press the Force
button.
If several rules described above apply to the same computer, the top priority will belong to the Active Directory group
rule, then the rule for IP subnets will follow, and then the domain rule.
CONFIGURING INTEGRATION WITH CISCO NETWORK ADMISSION
CONTROL (NAC)
Kaspersky Administration Kit allows the administrator to associate the conditions of computer anti-virus protection and
the security statuses assigned by Cisco Network Admission Control (NAC).
To configure a mapping between Cisco NAC statuses and anti-virus protection conditions:
1. Select the Administration Server in the console tree and select Properties from its context menu. This will open
the Server settings configuration window. Switch to the Cisco NAC tab (see the figure below).
Page 50
R E F E R E N C E G U I D E
50
This tab does not appear if the Kaspersky Lab Cisco NAC Posture Validation Server component was not
installed together with the Administration Server (for details please refer to the Kaspersky Administration Kit
Implementation Guide).
Figure 34. Viewing the Administration Server properties. The Cisco NAC tab
2. Select a Cisco NAC host state from the drop-down list: Healthy, Checkup, Quarantine or Infected.
3. Check the necessary boxes in the table below to select the anti-virus protection conditions that are mapped to
the above statuses. If necessary, change the threshold values for conditions.
The Healthy status is only assigned if all the selected conditions are met; the Checkup, Quarantine or Infected
statuses apply if at least one of the selected conditions is fulfilled. Threshold values may be modified for some
conditions. Select a condition in the Condition column and use the Modify button to open an editing window
(see the figure below).
Figure 35. The Edit condition window
Page 51
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
51
4. Use the PVS port number field to set the Posture Validation Server port used for communication with the Cisco
server. The default port number is 18000.
5. Click Apply or OK to complete the configuration.
TRAFFIC LIMIT RULES
To decrease the network load, you can restrict the rate of data transfer to an Administration Server for individual IP
subnets and IP ranges. Maximum allowed data transfer rates and the interval for which they should apply are specified in
rules. The rules are listed in the Traffic tab of the Administration Server properties window.
To add a rule, press the Add button and use the displayed window to specify its parameters:
1. In the IP address range to limit traffic section select the method used to define a subnet or range:
Specify range as address and network mask and enter the subnet parameters in the Subnet address
and Subnet mask fields.
Specify IP range as start and end addresses and enter the range boundaries in the Start and End fields.
2. In the Traffic limit section specify the following data:
Borders of the time interval during which the traffic limitation will be enabled in the Time period field.
Maximum value of the data transfer rate for information upload to Administration Server in the Limit (KB/s);
the limitation will be enabled during the time interval specified in the Time period field.
Maximum value of the data transfer rate during time other than the period defined in the Traffic limit the
remainder of the time (KB/s) field, if traffic intensity must be restricted all the time.
When the rule settings have been edited, the rule appears in the list. The name of the rule is generated automatically
based on the data that defines the range of IP addresses.
If the limits of the IP range, addresses or subnet mask in the rule properties are modified, the rule name in the list
changes in accordance with the new values.
To delete a rule, select it in the list and press the Remove button.
To view or modify the settings of an existing rule, select it in the list and press the Properties button.
SLAVE ADMINISTRATION SERVERS
Administration Servers can be arranged a "master server – slave server" type hierarchy. Each Administration Server can
have several slave Servers on the same or different nesting levels of the hierarchy. The nesting level for slave servers is
not limited. The administration groups of the master Server will then include the client computers of all slave Servers.
Thus, isolated and independent sections of computer networks can be controlled by different Administration Servers
which are in turn managed by the master Server.
ADDING A SLAVE SERVER
To add a slave Administration Server:
1. Select in the administration group the Administration Servers node, open the context menu and select the
New Administration Server command. A wizard will start. Follow the wizard's instructions.
Page 52
R E F E R E N C E G U I D E
52
2. Specify the network address of the slave Administration Server. In this case, the master Administration Server
will connect to the slave Server and transfer all properties, including the network address of the Master
Administration Server and certificate of the Master Administration Server.
3. In the next window of the wizard, specify the name of the slave Administration Server. The new Administration
Server will be displayed under this name in the administration group. The name must be unique within one level
of the hierarchy.
If you specified the Server address during the previous step, the Slave Administration Server display name
field will contain the following value: Administration Server <computer name>, where <computer name>
stands for the name of the host specified in the address, which must be added as a slave Server.
4. If you have not defined the slave Administration Server address earlier, use the Select button to specify the
path to the Administration Server certificate.
5. If you have previously specified the slave Server's address, specify the settings for connecting the slave
Administration Server to the master Server.
Specify the address of the master Administration Server. You can use either its IP address or the
computer's name in the Windows network as the computer's address.
If a proxy server is used for connection, configure the connection settings in the Proxy server settings
group of fields.
Check the Use proxy server box. Enter the proxy server address in the Address field. Fill in the fields
User name, Password and Confirm password if user authentication is required to access the proxy
server.
If the address of the slave server has not been specified, this step will be skipped.
6. Please wait until the following operations have been completed:
Connection of the Administration Console to the slave Server.
Information about the slave Server is added to the master Administration Server's database.
If you have defined the slave Administration Server address earlier, enter in the displayed prompt the
information of an account (user name and password) that is authorized to connect to the computer, which
you plan to use as a slave Server.
The settings used to connect the slave Administration Server to the master Server are configured.
If the slave Server's address has not been specified, you will have to perform the following actions manually
after the wizard completes:
connect the Administration Console to the slave Server;
configure the connection between the slave Administration Server and the master Server.
7. Press the Next button. The progress of the action will be displayed in the wizard window. If errors occur, an
error message will be displayed.
8. In the last wizard window press the Finish button.
When the wizard completes, the master Administration Server will add information about the slave Server to its
database. The icon and the name of the slave Server will appear in the Administration Servers folder within the
corresponding administration group.
Page 53
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
53
CONFIGURING THE CONNECTION OF THE SLAVE SERVER TO THE
MASTER SERVER
To configure the connection of a slave Server to the master Administration Server:
1. Add the slave Administration Server to the console tree (see section "Adding a Server to the console tree" on
page 25) as a managed Administration Server.
2. Select the Administration Server and use the Properties command of the context menu to open its properties
window.
3. In the Administration Server <computer name> Properties window that opens, on the General tab, click on
the Advanced link. In the window that opens press the Settings button in the Administration Servers hierarchy section.
4. In the next Master Administration Server settings window that opens (see the figure below), check the box
This Administration Server is a slave server in the server hierarchy.
Then in the block of parameters below specify:
Address of the master Administration Server. You can use either its IP address or the computer's name in
the Windows network as the computer's address.
Certificate of the Master Administration Server. The path to the certificate file can be specified using the
Select button.
If you are connecting via a proxy server, check the Use proxy server box. Enter the address for connecting to
the proxy server in the Address field. Fill in the fields User name, Password and Confirm password if user
authentication is required to access the proxy server.
5. To confirm the settings, press the OK or Apply button.
Page 54
R E F E R E N C E G U I D E
54
As a result, the slave Administration Server will connect to the master Server and will receive from it all the policies and
tasks for the group to which the slave Server now belongs. You can then connect to the slave Server via the master
Server from the Administration Server node.
Figure 36. Configuring the slave Administration Server's connection to the master Administration Server
VIEWING ADMINISTRATION GROUPS OF A SLAVE ADMINISTRATION
SERVER
To view the administration groups of a slave Administration Server via the master Server, connect the Console to
the slave server:
1. In the console tree of the master Administration Server, select the Administration Servers node in the folder of
the required group.
2. In the Administration Servers node select the required slave Server.
3. Open the context menu and select the Connect to Administration Server command.
The Administration console will reflect the structure of the administration groups of the slave Administration Server. Then
you can view the structure of the groups (see section "Viewing information about groups" on page 65).
The slave Administration Server inherits from the master Server all the group tasks and policies of the group to which it
belongs. Inherited policies and tasks are indicated on the slave Server as follows:
The icon will be displayed next to the names of the policy inherited from the master Administration server
(the regular policy icon is ).
Page 55
M A N A G I N G A D M I N I S T R A T I O N S E R V E R S
55
The settings of the inherited policy will not be accessible for changes on the slave Server on shut down.
The settings that are specified as not modifiable in the inherited policy are indicated by the "locked" icon in
all application policies on the slave Server, and use values specified in the inherited policy.
Values of the settings that are not "locked" in the inherited policy are indicated by the "unlocked" icon (). If the
setting is specified as modifiable in the slave Server policy, it can be changed in the application settings (see
section "Viewing and configuring policy settings" on page 77) and task settings (see section "Viewing and
changing task settings" on page 112).
The icon will be displayed next to the names of group tasks inherited from the master Administration server
(the regular task icon is ).
The policies and tasks received by the slave Administration Server from the master Administration Server
cannot be modified.
The Administration Server tasks and the tasks for specific computers are not transferred to slave Servers.
To manage a slave Administration Server via the Console of the master Server,
add a computer on which the slave Administration Server is installed to the console tree as a new Server (see
section "Adding a slave Server" on page 51), and switch to the node corresponding to this Server.
CONNECTING TO THE ADMINISTRATION SERVER VIA
INTERNET
To connect to an Administration Server via Internet, the following requirements should be satisfied:
The Administration Server in the main office should have an external IP address, and the incoming ports 13000
and 14000 should be open on it.
The external IP address of the master Administration Server should be specified during the installation of the
Network Agent to remote office computers. If an installation package is used for installation, the external IP
address is specified manually in the properties of this package on the Settings tab.
The Network Agent should be installed on remote office computers first.
To manage applications and tasks of a client computer, the administrator should go to the properties of this
computer and on the General tab check the box in the Do not disconnect from the Administration Server.
After the box is checked, wait till Administration Server syncs with a remote client computer. This box can be
checked simultaneously for up to 100 client computers.
To speed up tasks on the client computer, open the 15000 port. In such case, to start a task the Administration
Server sends a special package to the Network Agent by 15000 port. The Administration Server does not
require a syncronization with a client computer.
Page 56
56
MANAGING ADMINISTRATION GROUPS
IN THIS SECTION
Adding, moving and deleting a group .............................................................................................................................. 56
Creating the structure of administration groups ............................................................................................................... 58
Viewing information about a group .................................................................................................................................. 65
Viewing and changing group settings ................................................................................................ .............................. 66
The Administration Server and the hosts in the corporate network (client computers) interact using the Network Agent.
This component must be installed on all computers running the Kaspersky Lab applications managed via Kaspersky
Administration Kit.
Client computers may be combined into administration groups (groups) in accordance with the corporate structure. The
following settings can be defined for client computers within a single group:
common application settings (through policies);
common operation mode of the applications (through creation of group tasks).
The administrator can create a hierarchy of Servers and groups with any nesting level if that can simplify the
management of installed applications. A single hierarchy level can include slave Administration Servers, groups and
client computers.
ADDING, MOVING AND DELETING A GROUP
To create a group:
1. In the console tree, open the Managed computers folder.
2. Select the folder corresponding to the group which should include the new group. If you create a group at the
highest hierarchy level, select the Managed computers folder.
3. Open the context menu and use the NewGroup command or the Create a subgroup link in the task pane.
4. Enter the group name in the window that opens (see the figure below) and click the OK button.
Page 57
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
57
A new subfolder with the specified name will appear in the Managed computers folder in the console tree. This new
folder will automatically contain the following nested folders: Policies, Group tasks, Administration Servers, and
Client computers. They will be filled during the definition of group policies, the creation of group tasks and the addition
of slave Administration Servers.
Figure 37. Creating a group
To change a group name,
select the required policy in the console tree, open its context menu and choose the Properties command or use
the Group properties link in the task pane. In the <Group name> Properties window that opens, rename the
group using the General tab (see the figure below).
You cannot rename the Managed computers folder because it is an in-built element of the Administration Console.
Figure 38. Viewing the group properties. The General tab
Page 58
R E F E R E N C E G U I D E
58
To move a group to another folder of the console tree:
select the folder to move and use the standard Cut or Paste commands of the context menu or drag it with the
mouse.
To delete a group:
select the group folder in the console tree and use the Delete command.
A group can only be deleted if it does not contain slave Servers, nested groups or client computers.
CREATING THE STRUCTURE OF ADMINISTRATION GROUPS
Kaspersky Administration Kit can create a structure of administration groups based on:
the Windows network domains and workgroups (see section "The structure of groups based on the Windows
network domains and workgroups" on page 59).
Active Directory (see section "Group structure based on Active Directory" on page 61).
the content of the text file (see section "Group structure based on the content of the text file" on page 63).
If for some reason a computer is not registered in the Unassigned computers group during the creation of a
group structure (if it is turned off or disconnected from the network), it will not be added to the corporate
network. You can do this later manually.
Creating a group structure using the wizard does not disturb network integrity: new groups are added, but do
not replace the existing groups. A client computer that has already been assigned to an existing group will not
be added again because the Unassigned computers group displays computers that are not included in the
network.
Page 59
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
59
THE STRUCTURE OF GROUPS BASED ON THE WINDOWS NETWORK
DOMAINS AND WORKGROUPS
To create a structure of administration groups based on the Windows network domains and workgroups:
1. Open the context menu of the Managed computers folder and select All tasks ® Create groups structure. This
will open the group structure creating wizard (see the figure below). Press the Next button.
Figure 39. Group structure creation wizard
2. In the window that opens, select Microsoft Windows Domains and Workgroups (see the figure below).
Page 60
R E F E R E N C E G U I D E
60
The group structure will be created based on the information about the structure of Windows network domains
obtained during the last network polling and the Unassigned computers presented in the group. Press the Next
button.
Figure 40. Determining the group creation method
3. In the following window select the group and press the Browse button located next to the Target group field.
This will open a window that contains a hierarchy of groups created for the Administration Server. To select a
group from the existing groups, open the Managed computers folder. If such a group does not exist, click the
New group folder to create a new group. The specified group is created in the Managed computers group.
Press the Next button.
4. In the next wizard window, press the Finish button to complete the administration group task creation.
Page 61
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
61
GROUP STRUCTURE BASED ON ACTIVE DIRECTORY
To create a structure of administration groups based on Active Directory:
1. Open the context menu of the Managed computers folder and select All tasksCreate groups structure.
This will open the group structure creating wizard (see the figure below). Press the Next button.
Figure 41. Group structure creation wizard
2. In the window that opens, select Active Directory (see the figure below).
Page 62
R E F E R E N C E G U I D E
62
The group structure will be created based on the information about the network structure of Active Directory
units obtained during the last polling of the network and the Unassigned computers presented in the group.
Press the Next button.
Figure 42. Determining the group creation method
3. In the following window select the group and press the Browse button located next to the Target group field.
This will open a window that contains a hierarchy of groups created for the Administration Server. To select a
group from the existing groups, open the Managed computers folder. If such a group does not exist, click the
New group folder to create a new group. The specified group is created in the Managed computers group.
Select the source Active Directory organization unit by clicking the Browse button located next to the Source Active Directory organization unit field. Press the Next button.
4. In the next wizard window, press the Finish button to complete the administration group task creation.
Page 63
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
63
GROUP STRUCTURE BASED ON THE CONTENT OF THE TEXT FILE
To create a group structure based on the content of the text file:
1. Open the context menu of the Managed computers folder and select All tasksCreate groups structure.
This will open the group structure creating wizard (see the figure below). Press the Next button.
Figure 43. Group structure creation wizard
2. In the window that opens, select the Text file item (see the figure below).
Page 64
R E F E R E N C E G U I D E
64
The group structure will be created in accordance with the text file created by the administrator. If you select this
Example:
Office 1
Office 2
Office 3
Three groups of the first hierarchy level will be created in the target group.
Example:
Office 1/Division 1/Department 1/Group 1
option, during the next step of the wizard select a group to which the nested subgroups would be added and
specify the text file containing the group structure.
Figure 44. Determining the group creation method
3. In the next window:
Select a group and press the Browse button located next to the Target group field. This will open a
window that contains a hierarchy of groups created for the Administration Server. To select a group from
the existing groups, open the Managed computers folder. If such a group does not exist, click the New group folder to create a new group. The specified group is created in the Managed computers group.
Specify the file based on which the hierarchy will be created for the group specified using the Target group
field. To do this, click the Browse button located next to the Text file with group names field, and select
the text file created earlier according to the following rules:
The name of each new group must begin with a new line, using a line break as a delimiter. Blank lines
will be ignored during the creation of the file.
The name of the nested group should be entered using a slash (/).
Page 65
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
65
Four subgroups nested into each other will be created in the target group.
Example:
Office 1/Division 1/Department 1
Office 1/Division 2/Department 1
Office 1/Division 3/Department 1
Office 1/Division 4/Department 1
One group of first hierarchy level Office 1 will be created in the destination group; this group will include four nested
groups of the same hierarchy level "Division 1", "Division 2", "Division 3", and "Division 4". Each of these groups will
include one more group - "Department 1".
In order to create several nested groups of the same hierarchy level, you should specify the "full path
to the group".
Press the Next button.
4. In the next wizard window, press the Finish button to complete the administration group task creation.
VIEWING INFORMATION ABOUT A GROUP
To view information about the structure of a group:
1. Open the Managed computers folder.
2. Select the folder with the name of the required group.
A list of objects included in this group will be displayed in the results pane. You can also expand the
corresponding branch of the console tree.
To view information about group policies, select the Policies folder.
If policies have been defined for the group, they will be displayed in the console tree, otherwise the folder
will be empty.
To view information about group tasks, select the Group tasks folder.
If tasks have been defined for the group, they will be displayed in the console tree, otherwise the folder will
be empty.
To work with slave Administration Servers, select the Administration Servers folder.
To work with clusters and arrays of servers, select the Clusters and server arrays folder. This folder will
be displayed in the console tree only if the cluster is included in the corporate network.
The items listed above depend on the user interface settings.
To view the list of client computers, select the Client computers folder. The list of client computers will be
Information in the Kaspersky Administration Kit results pane (for example, computer statuses, statistics or reports) is not
refreshed automatically. You can refresh information in the results pane by one of the three following methods: by
pressing the F5 key, by selecting the Refresh item from the context menu or by clicking the button on the toolbar.
displayed in the results pane.
Page 66
R E F E R E N C E G U I D E
66
VIEWING AND CHANGING GROUP SETTINGS
To view or change group settings:
1. Open the Managed computers group in the console tree.
2. Select the necessary group.
3. Open the context menu.
4. Select the Properties command.
This will open the group properties window that contains a set of tabs, which you can use to view and change the
security options and the settings for communication with client computers; establish the procedure for interaction with the
Administration Server, and specify the set of conditions determining the computer status.
To open the group properties window, you can also click the Group properties link in the task pane.
GENERAL SETTINGS
You can view and edit the group name on the General tab (see the figure below): The name must be unique within one
level of the folder or group hierarchy.
You cannot rename the Managed computers folder because it is an in-built element of the Administration Console.
This tab also displays the following information:
Parent group: the name of the group that includes this group. For the groups at the highest hierarchy level this
field contains the name of the Administration Server associated with this group.
Contains: statistics on the group structure – the number of nested groups and total number of client computers,
including client computers in nested groups.
Created: the date when the group was created.
Modified: the date when the name or attributes of the group were last modified. If the group name and group
properties have not been modified since their creation, the value is <Unknown>.
Page 67
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
67
The Reset button in the Detected virus counter section allows you to clear the counter of detected viruses for all client
computers in a group.
Figure 45. Viewing the group properties. The General tab
Page 68
R E F E R E N C E G U I D E
68
GRANTING RIGHTS TO WORK WITH A GROUP
The Security tab (see the figure below) is intended for configuration of access to an administration group.
Figure 46. Granting rights to access the Administration Group
Whether this tab is shown or hidden is determined by the user interface settings. To display the tab, navigate to the
ViewConfiguring interface menu and check the box in the Display security settings tabs string.
By default, the rights to work with a group are inherited from the Administration Server properties (see section "Granting
rights to use a Server" on page 26), where the rights to work with all objects managed by the Server are defined. To
configure individual access rights for an administration group that are different from those specified in the Administration
Server settings, uncheck the Inherit box.
The upper part of the tab displays a list of users and user groups that have access to the Administration Server. The
lower part contains the list of possible permissions:
All – includes all permissions (see below).
Reading – viewing Kaspersky Administration Kit objects' properties without a permission to perform operations,
create new objects or modify the existing ones.
Writing – changing Kaspersky Administration Kit object properties, as well as creating new objects without a
right to perform operations upon objects.
Running – performing operations on Kaspersky Administration Kit objects without a right to create new objects
or modify the existing ones.
Page 69
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
69
Modify access privileges – granting to users, and groups of users, access rights to the functionality of
Kaspersky Administration Kit.
Edit event log settings.
Edit notification settings.
Remote install of Kaspersky Lab applications.
Remote install of external applications – preparation of installation packages and remote install of third-party
applications and Kaspersky Lab applications to the client computers.
Edit Administration Server hierarchy settings.
Save network lists content – copy files from backup, quarantine and unprocessed files from client computers
to a computer where the Administration Console is installed.
Create tunnels – creating a tunneling connection between the computer where the Administration Console is
installed and a client computer.
To assign the rights for working with a group:
1. Select a group of users.
2. In the Allow column check the boxes next to the permissions provided to members of that group. If you check
the All box, all the boxes in the column will automatically be checked.
3. In the Deny column check the boxes next to the permissions that must not be provided to members of that
group. If you check the All box, all the boxes in the column will automatically be checked.
You can add a new group or a new user, using the Add button. You can only add groups of users and users that are
registered on the computer with the Administration Console installed.
To remove a group or a user, select an object from the list and click the Remove button.
The group of Kaspersky Administration Kit administrators (KLAdmins) cannot be removed.
Click the Apply or OK button to apply the settings.
CONDITIONS THAT DETERMINE COMPUTER STATUS
Use the Computer status properties window of the Administration Server's policy (see the figure below) to specify
criteria for determining whether a client computer will be assigned one of the statuses, Critical or Warning. If the client
computer does not match any of the conditions listed, it will be assigned the status OK.
Threshold values may be modified for some conditions. To change the value, double click a condition in the Condition
column to open the editing window.
Page 70
R E F E R E N C E G U I D E
70
For example, you can specify the maximum number of days during which the client computer has not connected to the
Administration Server. After this period, the computer will be assigned the status Critical.
Figure 47. Configuring the client computer's status diagnostics
If the computer status is OK, then an icon will be displayed next to its name, for example in the task pane of the main
application window. If the computer has the status Warning, an amber icon will be displayed. If the computer status
has the status Critical, a red icon will be displayed.
The criteria for determining the status of the client computer are defined in the settings at the level of the parent group,
and are inherited by all administration groups. To configure individual criteria for a group, uncheck the Inherit box and
configure the settings (for the top hierarchy level the Inherit box is inactive).
Clicking the link Computer visibility on the network opens the Computer visibility window. In the Computer visibility timeout (min) field of the window that opens, you can specify the time during which a client computer will be considered
visible in the network after it was disconnected from the Administration Server. The default interval is 60 minutes. After
the specified period expires, the Administration Server will consider the client computer inactive. If necessary, you can
modify this value in the Kaspersky Administration Kit policy settings (see section "Configuring the settings of the
Administration Server policy" on page 88).
MONITORING OF CLIENT COMPUTER ACTIVITY
Use the Client computers properties window of the administration group (see the figure below) to specify the following
parameters:
The Client computer activity in the network section specifies how the Administration Server reacts to the
inactivity of client computers of this group:
Page 71
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
71
If you wish the Kaspersky Administration Kit administrator to be notified after a period of inactivity, check
the Notify the administrator if the computer is not active for longer than (days) box and specify the
number of days in the field to the right of the box. When the period expires, the Administration Server will
perform the necessary actions.
Notification shall be performed in accordance with the settings specified in the properties of the
Administration Server (see section "Viewing and changing Administration Server settings" on page 28).
If you want inactive client computers to be deleted from the group, check the Delete the computer from
the group if it is not active for longer than (days) box and specify the number of days in the field to the
right of the box. Once the specified period has expired, the client computer will be automatically deleted
from the group and moved to the Unassigned computers group.
Figure 48. The group properties window. The Client computers tab
Specify the settings for inheriting values, specified on this tab:
Inherit from parent group –to ensure that the specified values are inherited from the group of the previous
hierarchy level. If this box is checked, the settings on the tab cannot be changed.
Force inheritance in child groups – to ensure that the specified values are distributed to subgroups. If
this box is checked, in the child groups properties the settings specified on the tab will be locked for
modification.
Page 72
R E F E R E N C E G U I D E
72
AUTOMATIC INSTALLATION OF APPLICATIONS ON CLIENT
COMPUTERS
On the Automatic installation tab you can specify which installation packages should be used for automatic remote
installation of Kaspersky Lab applications to client computers that have recently been added to the group. If a package is
used, the box corresponding to its name is selected. To prevent automatic deployment of an application, uncheck its box
next to the name of the corresponding installation package. By default, no software is automatically installed. For all
installation packages for which boxes are checked, remote deployment group tasks under the name Installation <Name of the selected installation package> will be created. You can run these tasks manually.
To automatically install Kaspersky Lab applications on new computers running the Microsoft Windows 98 / ME operating
systems, install the Network Agent on these computers in advance.
If some installation packages of one application were selected for automatic installation, the installation task will be
created for the most recent application version only.
Figure 49. The group properties window. The Automatic installation tab
Page 73
M A N A G I N G A D M I N I S T R A T I O N G R O U P S
73
CREATING THE LIST OF UPDATE AGENTS
The Update Agents tab (see the figure below) is used to create a list of computers (see section "Creating the list of
Update Agents and configuring the agents" on page 254), which are used within a group to distribute updates,
installation packages and group tasks and policies.
Local application settings ................................ .............................................................................................................. 128
Kaspersky Administration Kit enables remote management of the applications installed on the computers within
administration groups and corporate networks. The applications are managed via:
the creation of policies regulating the configuration of operation settings for the applications installed on client
computers;
creation and launch of tasks (see section "Managing tasks" on page 96), designed for administration groups, the
Administration Server or selected computers;
configuration of local settings for the applications installed on individual network computers.
MANAGING POLICIES
Application settings on client computers are centrally configured through definition of policies.
Policies created for applications within a group appear in the corresponding folder of the console tree. The name of each
policy is preceded by an icon indicating its status (see section "Statuses of computers, tasks and policies" on page 321).
CREATING A POLICY
To create a policy for a group:
1. In the console tree, select a group for which you wish to create a policy. In this group folder, select the Policies
folder and select the NewPolicy command on the context menu or click the Create a policy link in the task
pane. A wizard will start. Follow the wizard's instructions.
Use the links Create a policy for Kaspersky Anti-Virus for Windows Workstations and Create a policy for Kaspersky Anti-Virus for Windows Servers in the task pane to create the policies for the corresponding
applications. You will then not have to specify the application in the policy configuration wizard.
2. You must specify the policy name and select the application for which this policy is being created.
The policy name is assigned in a standard manner. If a policy with this name already exists, the (1) suffix will be
automatically added to the end of the name of the new policy.
Page 75
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
75
Select an application from the drop-down list (see the figure below). The drop-down list includes all applications
that have their administration plug-ins installed on the administrator's workstation.
Figure 51. Selecting an application for policy creation
3. Use the displayed window (see the figure below) to specify the policy status. Select one of the following:
Active policy. The policy being created will be used as the application's current policy.
Inactive policy. The policy will be saved in the Policies folder. If required, it can be activated (see section
"Activating a policy" on page 82).
Mobile user policy. This policy will be applied after you disconnect the computer from the corporate
network. This type of policy is available for Kaspersky Anti-Virus 6.0 for Windows Workstations MP3 and
later.
Page 76
R E F E R E N C E G U I D E
76
Several policies can be created in a group for one application, but only one policy can be active. Activating a
new policy makes the previously active policy inactive.
Figure 52. Policy creation wizard. Activating the policy
4. Then, you must specify the general settings for the policy and edit settings for the selected application
(see the figure below). You can lock policy settings for nested groups, application settings, or task settings.
Policy settings that can be locked are marked with the icon . To lock a setting, click this icon. The icon will
change to .
A policy has a higher priority compared with the local settings only if it prohibits modification of parameters (are
locked ).
When creating a policy, you can specify a minimum set of parameters required for application to run. All other
settings are set to the default values applied during the local installation of the application. You can modify the
policy by editing it (see section "Viewing and configuring policy settings" on page 77).
Page 77
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
77
For details on configuring policy settings for the applications, please refer to their corresponding documentation.
Figure 53. Creating a policy for Kaspersky Anti-Virus for Windows Workstations
5. In the last wizard window press the Finish button.
Once a policy is created, the parameters which may not be modified are applied on clients for which the policy was
created (are "locked" ).
DISPLAYING INHERITED POLICY IN THE NESTED GROUP RESULTS
PANE
To display inherited policies in the Policies folder of a child group:
1. Select the Policies folder of a nested group in the console tree.
2. Open the context menu, select View, and check the Inherited policies box.
This will display inherited policies in the console tree with the icon . You can view the inherited policies properties.
While policy inheritance is enabled, inherited policies can only be edited within the group under which they were created.
VIEWING AND CONFIGURING POLICY SETTINGS
To view group settings or modify them:
1. In the console tree, open the Policies folder of the administration group that you wish to configure.
2. Select the necessary policy.
Page 78
R E F E R E N C E G U I D E
78
3. Open the context menu and choose the Properties command.
To navigate quickly to the policy properties, select it in the console tree and use the Edit policy link in the Actions
section of the task pane.
This will open the <Policy name> properties window with several tabs in which you can configure a policy for an
application. The contents of the tabs are specific to each application, and their description is provided in the
documentation for the applications. The General, Events policy configuration tabs are common for all applications.
The General tab (see the figure below) contains the following policy information:
policy name;
the application for which the policy is created (for example, Kaspersky Administration Kit);
policy creation date and time;
date and time of the last policy modification;
policy status;
information about the results of policy enforcement.
You can use the tab to:
change the policy name;
Figure 54. The policy properties window
Page 79
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
79
view the results of policy enforcement;
access and configure the additional settings by clicking the Advanced link.
The Enforcing the policy on the client computers section also contains reference information about the results of
policy application on the client computers within the selected group, indicating the number of computers:
for which the policy was defined;
where the policy was enforced;
where the policy enforcement failed.
To update the information about the results of policy enforcement, press the Refresh button.
Detailed information about the results of policy enforcement on each client is available in the window (see the figure
below) accessed by pressing the Details button. The window displays a table that has the following columns:
Computer – client name.
Domain – name of the domain to which the client belongs.
Status – the policy status, which may have one of the following values:
Modified – settings for this policy have been changed on the Administration Server, but they were not yet
synchronized with the client computer;
Finished – the policy for an application on this computer has been successfully applied;
Pending – the policy for an application on this computer has not been applied yet;
Failed – the policy for an application on this computer has failed (the computer was turned off,
disconnected, the application did not run, or was not installed, etc.).
Page 80
R E F E R E N C E G U I D E
80
Date – date and time when the event occurred.
Figure 55. Information about policy enforcement on clients of one group
Local parameters are modified automatically based on the settings selected when a policy is first applied on a client
computer.
After a policy is deleted or revoked, the application will continue working with the settings specified in the policy. The
settings may subsequently be modified manually.
Applying a policy to a large number of clients will significantly increase the load on the Administration Server and the
amount of network traffic.
To access and configure the additional policy settings, click the Advanced link.
To define policy status, in the window that opens (see the figure below) in the Policy status section, select one of the
following options:
Active policy;
Mobile user policy;
Inactive policy.
To enable inheritance, i.e. prohibit modification of "locked" policy settings in the configuration of child policies, check the
Inherit settings from parent policy box. To disable inheritance, uncheck the Inherit settings from parent policy box.
To force inheritance of settings in child policies, enable the checkbox next to the corresponding item. After changes in a
policy are applied, the following steps will be performed:
specified values will be distributed to the policies of nested administration groups, i.e. to the child policies;
the Inherit settings from parent policy box will be checked in child policies;
Page 81
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
81
the values of the settings in child policies will remain "locked" until the Force inheritance of settings in child
policies box is checked.
Figure 56. Configuring additional policy settings
The Events tab (see the figure below) represents the information on events that are fixed in the application operation.
The event types are divided into three groups according to their severity level.
Figure 57. Editing a policy. The Events tab
Page 82
R E F E R E N C E G U I D E
82
Immediately after the policy has been created, the values on the Events tab will match the default application settings.
The settings are specific to each Kaspersky Lab application, and more information about them is available in user guides
for each application. If necessary, you can change the policy settings.
Configure the Events tab properties in the policy settings similarly to the Events tab settings in the Administration Server
properties (see section "General Administration Server settings" on page 28).
ACTIVATING A POLICY
For the policy to become active:
1. Select the required policy in the console tree.
2. Open the context menu and select the Properties command or use the Edit policy link in the Actions section
of the task pane.
3. Select the General tab (see the figure below) in the <Policy name> Properties application policy configuration
window.
4. Click the Advanced link to open the advanced settings window. In the Policy status section select Active policy.
To deactivate a policy, select Inactive policy.
To change the policy status quickly, use the Active policy and Inactive policy links in the task pane of the selected
policy.
Figure 58. The policy properties window
Page 83
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
83
ACTIVATING A POLICY BASED ON AN EVENT
To activate a policy automatically when a Virus outbreak event occurs,
in the Administration Server settings configured on the Virus outbreak the policy must be included in the
corresponding list (see section "Changing the application policy when a Virus outbreak event is registered" on
page 309).
If you activate a policy by event, you can return to the previous policy manually only.
POLICY FOR MOBILE USER
This policy type is available for Kaspersky Anti-Virus 6.0 for Windows Workstations MP4.
To configure the enforcement of a policy when a client computer disconnects from the corporate network:
1. Select the required policy in the console tree, open its context menu and choose the Properties command.
2. Select the General tab (see the figure below) in the Properties: <Policy name> application policy
configuration window.
Figure 59. The policy properties window
Page 84
R E F E R E N C E G U I D E
84
3. Click the Advanced link to open the additional policy settings window (see the figure below).
Figure 60. Additional policy settings window
4. In the Policy status section select Mobile user policy.
DELETING A POLICY
To delete a policy:
Select the necessary policy in the Policies folder within the console tree and use the Remove command from the
context menu or the Remove policy link in the task pane.
COPYING A POLICY
To copy a policy:
1. Select the necessary policy in the Policies folder in the results pane and use the Copy command from the
context menu.
2. Go to the Policies folder of the required group (or remain in the same folder) and use the Paste command from
the context menu.
An active policy becomes inactive when copied. If required, you can make this policy active (see section "Activating a
policy" on page 82).
As a result, the policy will be copied with all its settings and applied to the computers within the group into which it was
copied. If a policy with the same name exists in the folder, the _1 ending will be automatically added to its name.
CONFIGURING THE NETWORK AGENT'S POLICY
You can define the following parameters in the Settings window (see the figure below) while creating a policy for the
Network Agent:
In the Event log group use the Maximum size of event log, MB field to define maximum disk space that the
events log will be allowed to occupy.
Page 85
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
85
In the Application uninstallation password group press the Modify button and enter the password. This
password must be specified in the task of remote uninstallation of the Network Agent.
Figure 61. Creating a Network Agent policy. The Settings window
Page 86
R E F E R E N C E G U I D E
86
In the Repositories window specify the options for the system of collecting information about the applications installed
on computers within a group and objects in repositories. To reflect the information about applications in the applications
registry (see section "Applications registry" on page 272), check the Information about installed applications box. To
display information about objects placed in repositories by applications of version 6.0 MP3, in the corresponding folders
of the Repositories folder, check the Quarantined objects and Backup objects boxes.
Figure 62. Creating a Network Agent policy. The Repositories window
In the Network window (see the figure below) you can specify the settings for connection to an Administration Server.
In the Connect to the Administration Server field specify the following:
In the Synchronization interval (min) field specify the time interval (in minutes) between attempts to
synchronize data of the client computers and the Administration Server.
Check the Use SSL connection box if you wish the connection to be secure (using SSL protocol).
Check the Compress network traffic box to increase the rate of the data transfer by the Network Agent, by
decreasing the amount of the information transferred and hence decreasing the load on the Administration
Server.
If you enable this setting, the load on the central processor of the client computer may be increased.
Page 87
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
87
In the Network Agent port field, allow the Administration Server connection to the client computers using a UDP port,
and define the port number. To open the connection via the UDP port, check the Use UDP port box and enter the port
number in the UDP port number field. By default, port 15000 will be used; but if required, you can change it. Only
decimal notation is allowed.
Figure 63. Creating a Network Agent policy. The Network window
When editing the policy for the Network Agent, you can make changes on the General, Events, Settings, Repositories
and Network tabs.
Page 88
R E F E R E N C E G U I D E
88
In addition to the values configured in the policy creation wizard, on the Network tab (see the figure below) you can also
check the Open Network Agent ports in Microsoft Windows Firewall box. This will cause the UDP port required to
support Network Agent to be added to the Microsoft Windows firewall exception list.
Figure 64. Editing a Network Agent policy. The Network tab
CONFIGURING THE SETTINGS OF THE ADMINISTRATION SERVER
POLICY
When creating a policy for the Administration Server, specify Kaspersky Administration Kit in the application selection
window. Then, using the Settings window (see the figure below), you can configure general settings for the
Administration Server.
In the Administration Server connection settings field:
The number of the port used to connect to the Administration Server. By default, port 14000 is used; if this port
is in use, it can be changed;
the number of the port for secure connection to the Administration Server using SSL protocol. By default, port
13000 will be used.
Page 89
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
89
Specify the required value in the Maximum number of events stored in the database field. The default value is
400,000 records.
Figure 65. Creating an Administration Server policy. The Settings window
In the Scan network window (see the figure below) you can specify how the Administration Server updates its
information about the Windows network structure:
To enable automatic network polling, check the Allow scan box in the Windows network group.
To enable automatic polling of IP subnets, check the Allow scan box in the IP subnets group. The
Administration Server will poll the subnets with the period specified in the Scan interval (min) field. The default
interval between polls is 420 minutes.
Page 90
R E F E R E N C E G U I D E
90
To allow automatic network polling using the Active Directory structure, check the Allow scan box in the Active
Directory group.
Figure 66. Creating an Administration Server policy. The Scan network window
In addition to the values configured during policy creation, additional policy parameters may be modified.
Page 91
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
91
Use the Computer visibility timeout (min) field on the Settings tab (see the figure below) to specify the time during
which the client computer will be considered visible to the network after the connection with the Administration Server
has been lost. The default for this interval is 60 minutes. After the specified period expires, the Administration Server will
consider the client computer inactive.
Figure 67. Editing an Administration Server policy. The Settings tab
On the Scan network tab (see the figure below) you can define the following settings:
Intervals for Windows network polling:
Full scan time (min). Complete information about computers in the network will be updated with the
specified interval. The default interval between polls is 60 minutes.
Quick scan time (min). Information about the list of computers connected to the network will be updated
with the specified frequency. The default interval between polls is 15 minutes.
IP subnet scanning period (min). To do this, use the appropriate block in the Scan interval (min) field to specify
the required value. The default interval between polls is 420 minutes.
Page 92
R E F E R E N C E G U I D E
92
Intervals for network polling in accordance with the Active Directory structure. To do this, use the appropriate
block in the Scan interval (min) field to specify the required value. The default interval between polls is
60 minutes.
Figure 68. Editing an Administration Server policy. The Scan network tab
The Virus outbreak tab is used to specify when the Virus outbreak event will be raised for each anti-virus application
type. The settings on this tab are identical to those in the corresponding tab of the Administration Server properties
window.
The Cisco NAC tab may be used to define a mapping between anti-virus protection conditions and Cisco NAC statuses.
The settings on this tab are identical to those in the corresponding tab of the Administration Server properties window.
Page 93
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
93
You can use the Administration Servers hierarchy tab (see the figure below) to allow or prohibit editing of the server
hierarchy settings. If Allow hierarchy settings modification on slave servers is unchecked, slave Administration
Server administrators will not be able to edit hierarchy settings specified on the master Server.
Figure 69. Editing an Administration Server policy. The Administration Servers hierarchy tab
EXPORTING A POLICY
To export a policy:
1. In the console tree, select the required group.
2. Select the Policies subfolder.
In the results pane, you will see a list of all policies created for this group.
3. Select the necessary policy.
4. Open the context menu and select the Export command or use the Export policy to file link in the task pane.
5. In the displayed window specify the name and path for the destination file. Click the Save button.
Page 94
R E F E R E N C E G U I D E
94
IMPORTING A POLICY
To import a policy:
1. In the console tree, select the required group.
2. Select its Policies subfolder.
3. Open the context menu and select the All tasksImport command or use the Import policy from a file link
in the task pane of the Policies folder.
4. In the window that opens, specify the path to the source file containing the required policy. Click the Open
button.
The added policy will appear in the console tree.
POLICIES CONVERSION
Using Kaspersky Administration Kit, you can convert the policies of the previous version of Kaspersky Lab applications to
the current version. This may be useful, for example, when you install the Administration Server 8.0 on a computer with
the Administration Server 6.0 installed. This procedure is performed using the Policies and tasks conversion wizard.
To convert application policies and / or tasks:
1. In the console tree, select the Administration Server for which you wish to convert policies and / or tasks.
2. In the context menu, select All tasksPolicies and tasks conversion wizard. A wizard will start. Follow the
wizard's instructions.
3. In the Application name field (see the figure below), specify the application version. After the wizard
completes, the policies and tasks will be converted for work in the specified version of the application.
Figure 70. Selecting an application for conversion
Page 95
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
95
4. In the next wizard window (see the figure below), check boxes next to the policies, for which you wish to perform
the conversion. Pressing the Next button will perform the policies conversion.
Figure 71. Selecting policies for conversion
5. In the next wizard window (see the figure below), check boxes next to the tasks, for which you wish to perform
the conversion. Pressing the button Next will perform the tasks conversion.
Figure 72. Selecting tasks for conversion
Page 96
R E F E R E N C E G U I D E
96
The wizard will create new policies and tasks that use the policies and tasks settings of the previous version.
MANAGING TASKS
Kaspersky Administration Kit manages application installed on client computers by creating and running tasks. These
tasks implement the basic management features; for example, applications and licenses installation, file scan, database
and program modules updates. Tasks are subdivided into the following types:
group tasks (see section "Creating a group task" on page 97) – running on all client computers within an
administration group;
Administration Server tasks (see section "Creating an Administration Server task" on page 108) – running on
the Administration Server;
tasks for specific computers (see section "Creating a task for specific computers" on page 109) – running on a
small number of computers that are not put into a separate group;
local tasks (see section "Creating a local task" on page 110) – created and running on an individual client
computer.
The created tasks are displayed in the appropriate folder of the console tree. The icon indicating the task status is
displayed next to its name (see section "Statuses of computers, tasks and policies" on page 321).
KASPERSKY ADMINISTRATION KIT TASKS
The Administration Server performs the following tasks:
reports delivery (see section "Reports delivery task" on page 193).
downloading of updates to the repository (see section "Determining the updates list" on page 245).
Administration Server data backup (see section "Data backup" on page 299).
TASKS FOR SPECIFIC COMPUTERS
You can create tasks for specific computers in Kaspersky Administration Kit. Such specific computers can be included in
different administration groups. Kaspersky Administration Kit can perform the following main tasks:
Remote application installation (see the Implementation Guide for further details).
Message for users (see section "Sending message to the user of the client computer" on page 158).
Switching the Administration Server (see section "Administration Server change task" on page 145).
Managing the client computer (see section "Client computer management task" on page 148).
Updates verification (see section "Verifying downloaded updates" on page 249).
Distribution of the installation package (see the Implementation Guide for further details).
Remote application installation to the slave Administration Servers (see the Implementation Guide for further
details).
Remote application uninstallation (see the Implementation Guide for further details).
Page 97
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
97
CREATING A GROUP TASK
To create a group task:
1. In the console tree, select the group for which you want to create the task.
2. Select its Group tasks subfolder.
3. Open the context menu and use the NewTask command or the Create a task link in the task pane. This will
launch the New Task Wizard. Follow the wizard's instructions.
4. Specify the task name. If a task with the specified name already exists in the group, the _1 suffix will be
automatically added to the end of the name.
5. Then, select the application for which you want to create a task, and define the task type (see the figure below).
Figure 73. Creating a task. Selecting an application and defining task type
To select an application for which a task is to be created, select the corresponding node in the suggested tree.
The list includes all Kaspersky Lab applications that have their Console Plug-ins installed on the administrator's
workstation. To specify the task type, select one of the child nodes for the selected application.
Page 98
R E F E R E N C E G U I D E
98
6. You will then be prompted to configure the task according to the selected application (see the figure below).
Some settings are set by default. For details about task configuration, see documentation for a specific
application.
Figure 74. Task configuration
7. Then, create the task start schedule. Use the Scheduled start drop-down list to select the necessary mode for
task launch and configure the task schedule in the group of fields corresponding to the selected mode:
Every N hours;
Every N minutes;
Daily;
Weekly;
Monthly;
Once;
Manually – manual launch from the main window of Kaspersky Administration Kit using the Start command
of the context menu or the Run a task link in the task pane;
After application update – after every update of the application database;
At application start;
Immediately – start the task immediately (after the wizard finishes);
When new updates are downloaded to the repository – automatically after the Administration Server
downloads the updates;
On virus outbreak;
Page 99
R E M O T E M A N A G E M E N T O F A P P L I C A T I O N S
99
On completing another task.
This is the list of all scheduling modes available for Kaspersky Administration Kit tasks. Some of the listed
options may not be available depending on the task type.
The tasks for applications, which can be managed via Kaspersky Administration Kit, can have extra scheduling
modes. You can find more information about schedule options in the corresponding user guides.
If you set up the task to start Every N hours (see the figure below), specify the following:
The task start frequency in the Every hour field and the start date and time for the task in the Plan for field.
For example, if you entered value 2 in the Every hour field and entered August 3, 2008 3:00:00 p.m. in the
Plan for field, the task will start every two hours starting at 3 p.m. on August 3, 2008.
The default frequency value is set at 6, and the default start date and time for the task is automatically set
to the current system date and time of your computer.
The procedure for the task to start if the client computer is unavailable (turned off, disconnected from the
network, etc.) or if the application is not open at the time specified by the schedule.
Check the Run missed tasks box to make the system attempt to start the task the next time the application
is opened on this client computer. For Manually, Once, and Immediately the task will be started
immediately after the computer connects to the network.
If this box is not checked (default), only scheduled tasks will be started on the client computers, and for
Manually, Once, and Immediately - on hosts visible on the network only.
A variation of the scheduled time during which the task will be started on the client computers. This
capability is provided to spread the load caused by simultaneous calls made to the Administration Server by
numerous client computers when the task is launched.
Page 100
R E F E R E N C E G U I D E
100
Check the Randomize the task start with interval (min) box and specify the time (in minutes) so that the
client computers call the Administration Server within some interval after the task is started, rather than
simultaneously. By default, this box is unchecked.
Figure 75. Scheduling a task to start Every N hours
If you set up the task to start Every N minutes (see the figure below), specify the following:
The task start frequency in the Every minutes field and the start date and time for the task in the Plan for
field.
For example, if you entered value 10 in the Every field and entered August 3, 2008 3:00:00 p.m. in the
Plan for field, the task will start every ten minutes starting at 3 p.m. on August 3, 2008.
The default frequency value is set at 30, and the default start date and time for the task is automatically set
to the current system date and time of your computer.
An action if a client computer is temporarily unavailable at the task start.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.