KASPERSKY Security Microsoft Exchange Server Instal 8.0 User Manual

Kaspersky Security 8.0 for Micr osoft Exchange Servers
Installation Guide
APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1
2
Dear User!
Thank you for choosing our product. We hope that this document will help you in your work and provide answers to the majority of your questions.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts thereof will result in civil, administrative or criminal liability in accordance with applicable law.
Any type of reproduction or distribution of any materials, including in translated form, is allowed only with the written permission of Kaspersky Lab.
This document and the graphic images it contains may be used exclusively for informational, non-commercial or personal purposes.
This document may be amended without prior notification. For the latest version, please refer to Kaspersky Lab’s web site at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance or accuracy of any materials used in this document the rights to which are held by third parties, or for potential damages associated with using such materials.
Document revision date: 11/11/2013
© 2013 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3
TABLE OF CONTENTS
ABOUT THIS GUIDE .....................................................................................................................................................5
In this document .......................................................................................................................................................5
Document conventions .............................................................................................................................................6
SOURCES OF INFORMATION ABOUT THE APPLICATION........................................................................................8
Data sources for independent searching ..................................................................................................................8
Discussing Kaspersky Lab applications on the forum ...............................................................................................9
Contacting the Sales Department .............................................................................................................................9
Contacting the Technical Writing and Localization Unit ............................................................................................9
KASPERSKY SECURITY 8.0 FOR MICROSOFT EXCHANGE SERVERS ................................................................10
HARDWARE AND SOFTWARE REQUIREMENTS .....................................................................................................11
APPLICATION ARCHITECTURE.................................................................................................................................14
Application components and their purpose .............................................................................................................14
Security Server modules .........................................................................................................................................14
Backup and statistics database ..............................................................................................................................15
COMMON APPLICATION DEPLOYMENT MODELS ..................................................................................................16
Microsoft Exchange Server roles and corresponding protection configurations......................................................16
Basic application deployment models .....................................................................................................................17
Deploying the Administration Console separately from the Security Server ...........................................................17
Application deployment in a server cluster .............................................................................................................18
Application deployment in a Microsoft Exchange database availability group ........................................................18
PREPARING FOR APPLICATION INSTALLATION.....................................................................................................20
UPGRADING FROM AN EARLIER VERSION .............................................................................................................23
INSTALLING THE APPLICATION................................................................................................................................24
Step 1. Checking the availability of the required components and installing them ..................................................25
Step 2. Viewing information about the start of the installation and reviewing the License Agreement ....................25
Step 3. Selecting the installation type .....................................................................................................................25
Step 4. Selecting application components and modules.........................................................................................26
Step 5. Configuring the connection of the application to the SQL database ................................ ...........................27
Step 6. Selecting an account for launching the Kaspersky Security service ...........................................................28
Step 7. Completing installation ...............................................................................................................................28
GETTING STARTED....................................................................................................................................................29
Step 1. Installing a key ............................................................................................................................................29
Step 2. Configuring server protection .....................................................................................................................30
Step 3. Enabling the KSN service ...........................................................................................................................30
Step 4. Configuring the proxy server settings .........................................................................................................30
Step 5. Configuring notification settings..................................................................................................................31
Step 6. Completing the configuration ......................................................................................................................31
RESTORING THE APPLICATION ...............................................................................................................................32
REMOVING THE APPLICATION .................................................................................................................................33
CONTACTING THE TECHNICAL SUPPORT SERVICE .............................................................................................34
Ways to receive technical support ..........................................................................................................................34
I N S T A L L A T I O N G U I D E
4
Technical support by phone ....................................................................................................................................34
Obtaining technical support via Kaspersky CompanyAccount ................................................................................35
Using a trace file and AVZ script.............................................................................................................................36
KASPERSKY LAB ZAO ...............................................................................................................................................37
INFORMATION ABOUT THIRD-PARTY CODE...........................................................................................................38
TRADEMARK NOTICE ................................................................................................................................................39
INDEX ..........................................................................................................................................................................40
5
ABOUT THIS GUIDE
IN THIS SECTION
In this document ................................................................................................................................................................ 5
Document conventions ...................................................................................................................................................... 6
This document is the Installation and Troubleshooting Guide for Kaspersky Security.
It is meant for technical specialists tasked with installing and administering Kaspersky Security and supporting companies that use Kaspersky Security.
A specialist installing the application must be skilled in administering the operating system, installing and configuring software. The specialist must review this Guide before installing the application.
This Guide is intended to do the following:
Describe the preparation for Kaspersky Security installation, the application installation and activation process.
Give advice on preparing the application for operation.
Help to restore or remove the application.
to provide additional sources of information about the application and ways to get technical support.
IN THIS DOCUMENT
This document includes the following sections:
Sources of information about the application (see page 8)
This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.
Kaspersky Security 8.0 for Microsoft Exchange Servers (see page 10)
This section describes the features of the application and provides brief information about application functions and components. You will learn what items are included in the distribution kit and what services are available for registered users of the application. This section provides information about the software and hardware requirements that a computer must meet to allow installation.
Hardware and software requirements (see page 11)
To ensure proper operation of Kaspersky Security, your computer must meet the following requirements:
Application architecture (see page 14)
This section describes Kaspersky Security components and the logic of their interaction.
I N S T A L L A T I O N G U I D E
6
Typical deployment models for the application (see page 16)
This section covers the standard models of application deployment on a corporate network and the particulars of integration with third-party software.
Preparing for installation (see page 20)
This section describes the steps to be taken as you prepare to install the application.
Upgrading from an earlier version (see page 23)
This section describes how you can upgrade an older version of the application to the current version.
Installing the application (see page 24).
This section contains step-by-step instructions for installing and removing the application.
Getting started (see page 29)
This section contains step-by-step instructions performing initial configuration of the application.
Restoring the application (see page 32)
This section contains instructions for restoring the application.
Removing the application (see page 33)
This section contains instructions for removing the application.
Contacting Technical Support (see page 34)
This section explains how to contact Kaspersky Lab Technical Support.
Kaspersky Lab ZAO (see page 37)
This section contains information about Kaspersky Lab ZAO.
Information about third-party code (see page 38)
This section provides information about third-party code used in the application.
Trademark notices (see page 39)
This section lists third-party trademarks used in this document.
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
The text in this document is accompanied by semantic elements - warnings, tips and examples that you are advised to read thoroughly.
A B O U T T H IS GU I D E
7
SAMPLE TEXT
DOCUMENT CO NVENT IONS DESCRI PTION
Please note that...
Warnings are highlighted in red and enclosed in frames. Warnings contain information about potential threats that may cause loss of data,
hardware or operating system malfunctions.
It is recommended that you use...
Notes are enclosed in frames. Notes may contain helpful hints, recommendations, specific values for settings,
or noteworthy particular use cases.
Example:
...
Examples are given in blocks against a yellow background under the heading "Example".
An update is... The Databases are outdated event
occurs.
the following items are highlighted using italics:
new terms; status variations and application events.
Press ENTER. Use the ALT+F4 keyboard shortcut.
Names of keyboard keys appear in bold and are capitalized. Names of keys linked with a + (plus) sign indicate key combinations. Such keys
should be pressed simultaneously.
Click the Enable button.
UI elements, for example, names of entry fields, menu items, buttons are in bold.
To configure a task schedule,
perform the following steps:
Introductory phrases of instructions are printed in italics and marked with an arrow sign.
Enter help in the command line The following message will appear: Specify the date in DD:MM:YY format.
The following types of text content are set off with a special font:
command line text; text of program messages output on the screen; data that the user has to enter.
<User name>
Variables are enclosed in angle brackets. You should replace the variable with the corresponding value in each case, omitting the angle brackets.
These elements are intentionally highlighted using graphics and typeface. Document conventions and examples of their use are described in the table below.
Table 1. Document conventions
8
SOURCES OF INFORMATION ABOUT THE
IN THIS SECTION
Data sources for independent searching ........................................................................................................................... 8
Discussing Kaspersky Lab applications on the forum ....................................................................................................... 9
Contacting the Sales Department...................................................................................................................................... 9
Contacting the Technical Writing and Localization Unit..................................................................................................... 9
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.
You can select the most convenient source, depending on the urgency or importance of your question.
DATA SOURCES FOR INDEPENDENT SEARCHING
You can use the following sources to find information about the application:
Application page on the Kaspersky Lab website
Application page on the Technical Support website (Knowledge Base)
Online help
Documentation
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see section "Technical support by phone" on page 34).
An Internet connection is required to use information sources on the Kaspersky Lab website.
The application page on Kaspersky Lab's web site
The Kaspersky Lab website features a separate page dedicated to each application.
Visit http://www.kaspersky.com/security-microsoft-exchange-servers to view general information about the application, its features and functions.
A link to eStore is available on the http://www.kaspersky.com website. There you can purchase the application or renew your license.
The application page on the Technical Support web site (in the Knowledge Base)
Knowledge Base is a section on the Technical Support website that provides advice on using Kaspersky Lab applications. Knowledge Base comprises reference articles grouped by topics.
S O U R C E S O F I N F O R M A T I O N A B O U T T H E A P P L I C A T I O N
9
On the application page in Knowledge Base (http://support.kaspersky.com/exchange/security8.0) you will find articles providing useful tips, advice, and answers to the frequently asked questions about purchasing, installing, and using the application.
Articles may provide answers to questions relating not just to Kaspersky Security, but also to other Kaspersky Lab applications. They also may contain news from Technical Support.
Online help
The online help of the application comprises help files.
Online help contains information about each window of the application: the list of settings, their descriptions and links to the tasks using these settings.
Full help provides information about managing computer protection, configuring the application and solving typical user tasks.
Documentation
On this page of the Kaspersky Lab website (http://www.kaspersky.com/product-updates/microsoft-exchange-server-
antivirus), you can download documents that will help you to install the application on computers on the corporate
network, configure application settings, and find information about the basic techniques for using the application.
DISCUSSING KASPERSKY LAB APPLICATIONS ON THE
FORUM
If your issue does not require an immediate solution, you can discuss it with Kaspersky Lab specialists and other users on our Forum (http://forum.kaspersky.com).
On this forum you can browse existing threads, leave comments, and create new threads.
CONTACTING THE SALES DEPARTMENT
If you have any questions on how to select, purchase, or renew the application, you can contact our Sales Department specialists in one of the following ways:
By calling our Headquarters in Moscow (http://www.kaspersky.com/contacts).
By sending a message with your question to sales@kaspersky.com.
Service is available in Russian and English.
CONTACTING THE TECHNICAL WRITING AND LOCALIZATION UNIT
To contact the Technical Writing and Localization Unit, send an email to docfeedback@kaspersky.com. Please use "Kaspersky Help Feedback: Kaspersky Security 8.0 for Microsoft Exchange Servers" as the subject line in your message.
10
KASPERSKY SECURITY 8.0 FOR MICROSOFT EXCHANGE SERVERS
Kaspersky Security 8.0 for Microsoft Exchange Servers is an application designed for protection of mail servers based on Microsoft Exchange Server against viruses, Trojan software and other types of threats that may be transmitted via e­mail, as well as spam and phishing.
Kaspersky Security provides anti-spam protection on the level of your corporate mail server, saving your employees the trouble of deleting unwanted mail manually.
Kaspersky Security protects mailboxes, public folders, and relayed mail traffic on a Microsoft Exchange Server against malware, spam, and phishing. The application scans all e-mail traffic passing through the protected Microsoft Exchange Server.
Kaspersky Security can perform the following operations:
Scan mail traffic, incoming and outgoing mail, as well as the messages stored on a Microsoft Exchange Server
(including public folders) for malware. While scanning, the application processes the whole message and all its attached objects. Depending upon the selected settings, the application disinfects and removes detected harmful objects and provides users with complete information about them.
Filter unsolicited mail (spam) from mail traffic. The Anti-Spam component scans mail traffic for spam content. In
addition, Anti-Spam allows creation of black and white lists of sender addresses and supports flexible configuration of anti-spam analysis intensity.
Scan mail traffic for phishing and malicious URLs.
Save backup copies of objects (an object consists of message body and its attachments) and spam messages
prior to their disinfection or deletion to enable subsequent restoration, if required, thus preventing the risk of data losses. Configurable filters allow the user to easily locate specific stored objects.
Notify the sender, the recipient and the system administrator about messages that contain malicious objects.
Manage identical settings centrally in the group of Security Servers by means of profiles.
Maintain event logs, collect statistics and create regular reports on application activity. The application can
create reports automatically according to a schedule or by request.
Configure the application settings to match the volume and type of relayed mail traffic, in particular, define the
maximum connection wait time to optimize scanning.
Update the Kaspersky Security databases automatically or in manual mode. Updates can be downloaded from
the FTP and HTTP servers of Kaspersky Lab, from a local / network folder that contains the latest set of updates, or from user-defined FTP and HTTP servers.
Re-scan messages for the presence of new viruses according to a schedule. This task is performed as a
background scan and has little effect on the mail server’s performance.
Perform anti-virus protection on storage level based on the list of protected storages.
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
11
HARDWARE AND SOFTWARE REQUIREMENTS
For Kaspersky Security to work properly, the computer should meet the hardware and software requirements listed below.
Hardware requirements
The hardware requirements for installing the Security Server are identical to the hardware requirements for a protected Microsoft Exchange server. Depending upon the application settings and mode of operation, considerable disk space may be required for Backup and other service folders (when using default settings,the Backup folder can occupy up to 5120 MB). The Administration Console is installed together with the Security Server.
The Administration Console can be also installed separately from the Security Server. Hardware requirements for separate installation of the Administration Console:
Intel® Pentium® 400 MHz or faster processor (1000 MHz recommended);
256 MB free RAM;
500 MB disk space for the application files.
Software requirements
The Security Server can be installed under one of the following operating systems:
Microsoft Windows Server® 2012 R2;
Microsoft Windows Server 2012;
Microsoft Small Business Server 2011;
Microsoft Windows Server 2008 R2 Enterprise Edition Service Pack 1;
Microsoft Windows Server 2008 R2 Standard Edition Service Pack 1;
Microsoft Windows Server 2008 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 x64 Standard Edition Service Pack 2;
Microsoft Small Business Server 2008 Standard x64;
Microsoft Small Business Server 2008 Premium x64;
Microsoft Essential Business Server 2008 Standard x64;
Microsoft Essential Business Server 2008 Premium x64;
Microsoft Windows Server 2003 x64 R2 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2003 x64 R2 Standard Edition Service Pack 2;
Microsoft Windows Server 2003 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2003 x64 Standard Edition Service Pack 2.
I N S T A L L A T I O N G U I D E
12
The following software is required to install the Security Server:
One of the following mail servers:
Microsoft Exchange Server 2007 x64 Service Pack 3 or Microsoft Exchange Server 2010 Service Pack 1
deployed in at least one of the following roles: Hub Transport, Mailbox, or Edge Transport;
Microsoft Exchange Server 2013 deployed in the Mailbox role.
Microsoft .NET Framework 3.5 Service Pack 1.
One of the following database management systems:
Microsoft SQL Server® 2012;
Microsoft SQL Server 2012 Express.
Microsoft SQL Server 2008 R2 Enterprise Edition;
Microsoft SQL Server 2008 R2 Standard Edition;
Microsoft SQL Server 2008 R2 Express Edition;
Microsoft SQL Server 2008 Enterprise Edition;
Microsoft SQL Server 2008 Standard Edition;
Microsoft SQL Server 2008 Express Edition;
Microsoft SQL Server 2005 Enterprise Edition;
Microsoft SQL Server 2005 Standard Edition;
Microsoft SQL Server 2005 Express Edition.
Administration Console can be installed under one of the following operating systems:
Microsoft Windows® 8.1;
Microsoft Windows Server 2012 R2;
Microsoft Windows Server 2012;
Microsoft Windows 8;
Microsoft Windows 8 x64;
Microsoft Small Business Server 2011;
Microsoft Windows 7 Professional;
Microsoft Windows 7 Professional x64;
Microsoft Windows 7 Enterprise;
Microsoft Windows 7 Enterprise x64;
Microsoft Windows 7 Ultimate;
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
13
Microsoft Windows 7 Ultimate x64;
Microsoft Windows Server 2008 R2 Enterprise Edition Service Pack 1;
Microsoft Windows Server 2008 R2 Standard Edition Service Pack 1;
Microsoft Small Business Server 2008 Standard;
Microsoft Small Business Server 2008 Premium;
Microsoft Essential Business Server 2008 Standard;
Microsoft Essential Business Server 2008 Premium;
Microsoft Windows Server 2008 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 x64 Standard Edition Service Pack 2;
Microsoft Windows Server 2008 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 Standard Edition Service Pack 2;
Microsoft Windows Vista®;
Microsoft Windows Vista х64;
Microsoft Windows Server 2003 x64 R2 Standard Edition;
Microsoft Windows Server 2003 x64 R2 Enterprise Edition;
Microsoft Windows Server 2003 R2 Standard Edition;
Microsoft Windows Server 2003 R2 Enterprise Edition;
Microsoft Windows Server 2003 x64 Service Pack 2;
Microsoft Windows Server 2003 Service Pack 2;
Microsoft Windows XP Service Pack 3;
Microsoft Windows XP x64 Service Pack 2.
Installation of the Administration Console requires the following software:
Microsoft Management Console 3.0;
Microsoft .NET Framework 3.5 Service Pack 1.
Loading...
+ 28 hidden pages