KASPERSKY Security Microsoft Exchange Server Instal 8.0 User Manual

Kaspersky Security 8.0 for Micr osoft Exchange Servers
Installation Guide
APPLICATION VERSION: 8.0 MAINTENANCE RELEASE 2 CRITICAL FIX 1
2
Dear User!
Thank you for choosing our product. We hope that this document will help you in your work and provide answers to the majority of your questions.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal reproduction and distribution of this document or parts thereof will result in civil, administrative or criminal liability in accordance with applicable law.
Any type of reproduction or distribution of any materials, including in translated form, is allowed only with the written permission of Kaspersky Lab.
This document and the graphic images it contains may be used exclusively for informational, non-commercial or personal purposes.
This document may be amended without prior notification. For the latest version, please refer to Kaspersky Lab’s web site at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance or accuracy of any materials used in this document the rights to which are held by third parties, or for potential damages associated with using such materials.
Document revision date: 11/11/2013
© 2013 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3
TABLE OF CONTENTS
ABOUT THIS GUIDE .....................................................................................................................................................5
In this document .......................................................................................................................................................5
Document conventions .............................................................................................................................................6
SOURCES OF INFORMATION ABOUT THE APPLICATION........................................................................................8
Data sources for independent searching ..................................................................................................................8
Discussing Kaspersky Lab applications on the forum ...............................................................................................9
Contacting the Sales Department .............................................................................................................................9
Contacting the Technical Writing and Localization Unit ............................................................................................9
KASPERSKY SECURITY 8.0 FOR MICROSOFT EXCHANGE SERVERS ................................................................10
HARDWARE AND SOFTWARE REQUIREMENTS .....................................................................................................11
APPLICATION ARCHITECTURE.................................................................................................................................14
Application components and their purpose .............................................................................................................14
Security Server modules .........................................................................................................................................14
Backup and statistics database ..............................................................................................................................15
COMMON APPLICATION DEPLOYMENT MODELS ..................................................................................................16
Microsoft Exchange Server roles and corresponding protection configurations......................................................16
Basic application deployment models .....................................................................................................................17
Deploying the Administration Console separately from the Security Server ...........................................................17
Application deployment in a server cluster .............................................................................................................18
Application deployment in a Microsoft Exchange database availability group ........................................................18
PREPARING FOR APPLICATION INSTALLATION.....................................................................................................20
UPGRADING FROM AN EARLIER VERSION .............................................................................................................23
INSTALLING THE APPLICATION................................................................................................................................24
Step 1. Checking the availability of the required components and installing them ..................................................25
Step 2. Viewing information about the start of the installation and reviewing the License Agreement ....................25
Step 3. Selecting the installation type .....................................................................................................................25
Step 4. Selecting application components and modules.........................................................................................26
Step 5. Configuring the connection of the application to the SQL database ................................ ...........................27
Step 6. Selecting an account for launching the Kaspersky Security service ...........................................................28
Step 7. Completing installation ...............................................................................................................................28
GETTING STARTED....................................................................................................................................................29
Step 1. Installing a key ............................................................................................................................................29
Step 2. Configuring server protection .....................................................................................................................30
Step 3. Enabling the KSN service ...........................................................................................................................30
Step 4. Configuring the proxy server settings .........................................................................................................30
Step 5. Configuring notification settings..................................................................................................................31
Step 6. Completing the configuration ......................................................................................................................31
RESTORING THE APPLICATION ...............................................................................................................................32
REMOVING THE APPLICATION .................................................................................................................................33
CONTACTING THE TECHNICAL SUPPORT SERVICE .............................................................................................34
Ways to receive technical support ..........................................................................................................................34
I N S T A L L A T I O N G U I D E
4
Technical support by phone ....................................................................................................................................34
Obtaining technical support via Kaspersky CompanyAccount ................................................................................35
Using a trace file and AVZ script.............................................................................................................................36
KASPERSKY LAB ZAO ...............................................................................................................................................37
INFORMATION ABOUT THIRD-PARTY CODE...........................................................................................................38
TRADEMARK NOTICE ................................................................................................................................................39
INDEX ..........................................................................................................................................................................40
5
ABOUT THIS GUIDE
IN THIS SECTION
In this document ................................................................................................................................................................ 5
Document conventions ...................................................................................................................................................... 6
This document is the Installation and Troubleshooting Guide for Kaspersky Security.
It is meant for technical specialists tasked with installing and administering Kaspersky Security and supporting companies that use Kaspersky Security.
A specialist installing the application must be skilled in administering the operating system, installing and configuring software. The specialist must review this Guide before installing the application.
This Guide is intended to do the following:
Describe the preparation for Kaspersky Security installation, the application installation and activation process.
Give advice on preparing the application for operation.
Help to restore or remove the application.
to provide additional sources of information about the application and ways to get technical support.
IN THIS DOCUMENT
This document includes the following sections:
Sources of information about the application (see page 8)
This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.
Kaspersky Security 8.0 for Microsoft Exchange Servers (see page 10)
This section describes the features of the application and provides brief information about application functions and components. You will learn what items are included in the distribution kit and what services are available for registered users of the application. This section provides information about the software and hardware requirements that a computer must meet to allow installation.
Hardware and software requirements (see page 11)
To ensure proper operation of Kaspersky Security, your computer must meet the following requirements:
Application architecture (see page 14)
This section describes Kaspersky Security components and the logic of their interaction.
I N S T A L L A T I O N G U I D E
6
Typical deployment models for the application (see page 16)
This section covers the standard models of application deployment on a corporate network and the particulars of integration with third-party software.
Preparing for installation (see page 20)
This section describes the steps to be taken as you prepare to install the application.
Upgrading from an earlier version (see page 23)
This section describes how you can upgrade an older version of the application to the current version.
Installing the application (see page 24).
This section contains step-by-step instructions for installing and removing the application.
Getting started (see page 29)
This section contains step-by-step instructions performing initial configuration of the application.
Restoring the application (see page 32)
This section contains instructions for restoring the application.
Removing the application (see page 33)
This section contains instructions for removing the application.
Contacting Technical Support (see page 34)
This section explains how to contact Kaspersky Lab Technical Support.
Kaspersky Lab ZAO (see page 37)
This section contains information about Kaspersky Lab ZAO.
Information about third-party code (see page 38)
This section provides information about third-party code used in the application.
Trademark notices (see page 39)
This section lists third-party trademarks used in this document.
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
The text in this document is accompanied by semantic elements - warnings, tips and examples that you are advised to read thoroughly.
A B O U T T H IS GU I D E
7
SAMPLE TEXT
DOCUMENT CO NVENT IONS DESCRI PTION
Please note that...
Warnings are highlighted in red and enclosed in frames. Warnings contain information about potential threats that may cause loss of data,
hardware or operating system malfunctions.
It is recommended that you use...
Notes are enclosed in frames. Notes may contain helpful hints, recommendations, specific values for settings,
or noteworthy particular use cases.
Example:
...
Examples are given in blocks against a yellow background under the heading "Example".
An update is... The Databases are outdated event
occurs.
the following items are highlighted using italics:
new terms; status variations and application events.
Press ENTER. Use the ALT+F4 keyboard shortcut.
Names of keyboard keys appear in bold and are capitalized. Names of keys linked with a + (plus) sign indicate key combinations. Such keys
should be pressed simultaneously.
Click the Enable button.
UI elements, for example, names of entry fields, menu items, buttons are in bold.
To configure a task schedule,
perform the following steps:
Introductory phrases of instructions are printed in italics and marked with an arrow sign.
Enter help in the command line The following message will appear: Specify the date in DD:MM:YY format.
The following types of text content are set off with a special font:
command line text; text of program messages output on the screen; data that the user has to enter.
<User name>
Variables are enclosed in angle brackets. You should replace the variable with the corresponding value in each case, omitting the angle brackets.
These elements are intentionally highlighted using graphics and typeface. Document conventions and examples of their use are described in the table below.
Table 1. Document conventions
8
SOURCES OF INFORMATION ABOUT THE
IN THIS SECTION
Data sources for independent searching ........................................................................................................................... 8
Discussing Kaspersky Lab applications on the forum ....................................................................................................... 9
Contacting the Sales Department...................................................................................................................................... 9
Contacting the Technical Writing and Localization Unit..................................................................................................... 9
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the application's operation.
You can select the most convenient source, depending on the urgency or importance of your question.
DATA SOURCES FOR INDEPENDENT SEARCHING
You can use the following sources to find information about the application:
Application page on the Kaspersky Lab website
Application page on the Technical Support website (Knowledge Base)
Online help
Documentation
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see section "Technical support by phone" on page 34).
An Internet connection is required to use information sources on the Kaspersky Lab website.
The application page on Kaspersky Lab's web site
The Kaspersky Lab website features a separate page dedicated to each application.
Visit http://www.kaspersky.com/security-microsoft-exchange-servers to view general information about the application, its features and functions.
A link to eStore is available on the http://www.kaspersky.com website. There you can purchase the application or renew your license.
The application page on the Technical Support web site (in the Knowledge Base)
Knowledge Base is a section on the Technical Support website that provides advice on using Kaspersky Lab applications. Knowledge Base comprises reference articles grouped by topics.
S O U R C E S O F I N F O R M A T I O N A B O U T T H E A P P L I C A T I O N
9
On the application page in Knowledge Base (http://support.kaspersky.com/exchange/security8.0) you will find articles providing useful tips, advice, and answers to the frequently asked questions about purchasing, installing, and using the application.
Articles may provide answers to questions relating not just to Kaspersky Security, but also to other Kaspersky Lab applications. They also may contain news from Technical Support.
Online help
The online help of the application comprises help files.
Online help contains information about each window of the application: the list of settings, their descriptions and links to the tasks using these settings.
Full help provides information about managing computer protection, configuring the application and solving typical user tasks.
Documentation
On this page of the Kaspersky Lab website (http://www.kaspersky.com/product-updates/microsoft-exchange-server-
antivirus), you can download documents that will help you to install the application on computers on the corporate
network, configure application settings, and find information about the basic techniques for using the application.
DISCUSSING KASPERSKY LAB APPLICATIONS ON THE
FORUM
If your issue does not require an immediate solution, you can discuss it with Kaspersky Lab specialists and other users on our Forum (http://forum.kaspersky.com).
On this forum you can browse existing threads, leave comments, and create new threads.
CONTACTING THE SALES DEPARTMENT
If you have any questions on how to select, purchase, or renew the application, you can contact our Sales Department specialists in one of the following ways:
By calling our Headquarters in Moscow (http://www.kaspersky.com/contacts).
By sending a message with your question to sales@kaspersky.com.
Service is available in Russian and English.
CONTACTING THE TECHNICAL WRITING AND LOCALIZATION UNIT
To contact the Technical Writing and Localization Unit, send an email to docfeedback@kaspersky.com. Please use "Kaspersky Help Feedback: Kaspersky Security 8.0 for Microsoft Exchange Servers" as the subject line in your message.
10
KASPERSKY SECURITY 8.0 FOR MICROSOFT EXCHANGE SERVERS
Kaspersky Security 8.0 for Microsoft Exchange Servers is an application designed for protection of mail servers based on Microsoft Exchange Server against viruses, Trojan software and other types of threats that may be transmitted via e­mail, as well as spam and phishing.
Kaspersky Security provides anti-spam protection on the level of your corporate mail server, saving your employees the trouble of deleting unwanted mail manually.
Kaspersky Security protects mailboxes, public folders, and relayed mail traffic on a Microsoft Exchange Server against malware, spam, and phishing. The application scans all e-mail traffic passing through the protected Microsoft Exchange Server.
Kaspersky Security can perform the following operations:
Scan mail traffic, incoming and outgoing mail, as well as the messages stored on a Microsoft Exchange Server
(including public folders) for malware. While scanning, the application processes the whole message and all its attached objects. Depending upon the selected settings, the application disinfects and removes detected harmful objects and provides users with complete information about them.
Filter unsolicited mail (spam) from mail traffic. The Anti-Spam component scans mail traffic for spam content. In
addition, Anti-Spam allows creation of black and white lists of sender addresses and supports flexible configuration of anti-spam analysis intensity.
Scan mail traffic for phishing and malicious URLs.
Save backup copies of objects (an object consists of message body and its attachments) and spam messages
prior to their disinfection or deletion to enable subsequent restoration, if required, thus preventing the risk of data losses. Configurable filters allow the user to easily locate specific stored objects.
Notify the sender, the recipient and the system administrator about messages that contain malicious objects.
Manage identical settings centrally in the group of Security Servers by means of profiles.
Maintain event logs, collect statistics and create regular reports on application activity. The application can
create reports automatically according to a schedule or by request.
Configure the application settings to match the volume and type of relayed mail traffic, in particular, define the
maximum connection wait time to optimize scanning.
Update the Kaspersky Security databases automatically or in manual mode. Updates can be downloaded from
the FTP and HTTP servers of Kaspersky Lab, from a local / network folder that contains the latest set of updates, or from user-defined FTP and HTTP servers.
Re-scan messages for the presence of new viruses according to a schedule. This task is performed as a
background scan and has little effect on the mail server’s performance.
Perform anti-virus protection on storage level based on the list of protected storages.
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
11
HARDWARE AND SOFTWARE REQUIREMENTS
For Kaspersky Security to work properly, the computer should meet the hardware and software requirements listed below.
Hardware requirements
The hardware requirements for installing the Security Server are identical to the hardware requirements for a protected Microsoft Exchange server. Depending upon the application settings and mode of operation, considerable disk space may be required for Backup and other service folders (when using default settings,the Backup folder can occupy up to 5120 MB). The Administration Console is installed together with the Security Server.
The Administration Console can be also installed separately from the Security Server. Hardware requirements for separate installation of the Administration Console:
Intel® Pentium® 400 MHz or faster processor (1000 MHz recommended);
256 MB free RAM;
500 MB disk space for the application files.
Software requirements
The Security Server can be installed under one of the following operating systems:
Microsoft Windows Server® 2012 R2;
Microsoft Windows Server 2012;
Microsoft Small Business Server 2011;
Microsoft Windows Server 2008 R2 Enterprise Edition Service Pack 1;
Microsoft Windows Server 2008 R2 Standard Edition Service Pack 1;
Microsoft Windows Server 2008 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 x64 Standard Edition Service Pack 2;
Microsoft Small Business Server 2008 Standard x64;
Microsoft Small Business Server 2008 Premium x64;
Microsoft Essential Business Server 2008 Standard x64;
Microsoft Essential Business Server 2008 Premium x64;
Microsoft Windows Server 2003 x64 R2 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2003 x64 R2 Standard Edition Service Pack 2;
Microsoft Windows Server 2003 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2003 x64 Standard Edition Service Pack 2.
I N S T A L L A T I O N G U I D E
12
The following software is required to install the Security Server:
One of the following mail servers:
Microsoft Exchange Server 2007 x64 Service Pack 3 or Microsoft Exchange Server 2010 Service Pack 1
deployed in at least one of the following roles: Hub Transport, Mailbox, or Edge Transport;
Microsoft Exchange Server 2013 deployed in the Mailbox role.
Microsoft .NET Framework 3.5 Service Pack 1.
One of the following database management systems:
Microsoft SQL Server® 2012;
Microsoft SQL Server 2012 Express.
Microsoft SQL Server 2008 R2 Enterprise Edition;
Microsoft SQL Server 2008 R2 Standard Edition;
Microsoft SQL Server 2008 R2 Express Edition;
Microsoft SQL Server 2008 Enterprise Edition;
Microsoft SQL Server 2008 Standard Edition;
Microsoft SQL Server 2008 Express Edition;
Microsoft SQL Server 2005 Enterprise Edition;
Microsoft SQL Server 2005 Standard Edition;
Microsoft SQL Server 2005 Express Edition.
Administration Console can be installed under one of the following operating systems:
Microsoft Windows® 8.1;
Microsoft Windows Server 2012 R2;
Microsoft Windows Server 2012;
Microsoft Windows 8;
Microsoft Windows 8 x64;
Microsoft Small Business Server 2011;
Microsoft Windows 7 Professional;
Microsoft Windows 7 Professional x64;
Microsoft Windows 7 Enterprise;
Microsoft Windows 7 Enterprise x64;
Microsoft Windows 7 Ultimate;
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
13
Microsoft Windows 7 Ultimate x64;
Microsoft Windows Server 2008 R2 Enterprise Edition Service Pack 1;
Microsoft Windows Server 2008 R2 Standard Edition Service Pack 1;
Microsoft Small Business Server 2008 Standard;
Microsoft Small Business Server 2008 Premium;
Microsoft Essential Business Server 2008 Standard;
Microsoft Essential Business Server 2008 Premium;
Microsoft Windows Server 2008 x64 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 x64 Standard Edition Service Pack 2;
Microsoft Windows Server 2008 Enterprise Edition Service Pack 2;
Microsoft Windows Server 2008 Standard Edition Service Pack 2;
Microsoft Windows Vista®;
Microsoft Windows Vista х64;
Microsoft Windows Server 2003 x64 R2 Standard Edition;
Microsoft Windows Server 2003 x64 R2 Enterprise Edition;
Microsoft Windows Server 2003 R2 Standard Edition;
Microsoft Windows Server 2003 R2 Enterprise Edition;
Microsoft Windows Server 2003 x64 Service Pack 2;
Microsoft Windows Server 2003 Service Pack 2;
Microsoft Windows XP Service Pack 3;
Microsoft Windows XP x64 Service Pack 2.
Installation of the Administration Console requires the following software:
Microsoft Management Console 3.0;
Microsoft .NET Framework 3.5 Service Pack 1.
14
APPLICATION ARCHITECTURE
IN THIS SECTION
Application components and their purpose ..................................................................................................................... 14
Security Server modules ................................................................................................................................................. 14
Backup and statistics database ....................................................................................................................................... 15
This section describes Kaspersky Security components and the logic of their interaction.
APPLICATION COMPONENTS AND THEIR PURPOSE
Kaspersky Security consists of two basic components:
The Security Server is installed on the Microsoft Exchange server and performs anti-spam filtering of mail
traffic and provides anti-virus protection. The Security Server intercepts messages arriving on the Microsoft Exchange Server and uses its internal Anti-Virus and Anti-Spam modules to perform anti-virus scanning and anti-spam filtering of such messages. If infection or spam is detected in the incoming message, the application processes it according to the Anti-Virus and Anti-Spam settings.
The Administration Console is a dedicated isolated snap-in integrated into MMC 3.0. You can use the
Administration Console to create and edit the list of protected Microsoft Exchange servers and manage Security Servers. The Administration Console can be installed either on a Microsoft Exchange server together with the Security Server or on a remote computer (see section "Deploying the Administration Console separately from the Security Server" on page 17).
SECURITY SERVER MODULES
Security Server consists of the following modules:
E-mail Interceptor. Intercepts messages arriving on the Microsoft Exchange server and forwards them to Anti-
Virus and Anti-Spam. This module is integrated into Microsoft Exchange processes using either VSAPI 2.6 or Transport Agents technology depending on the role in which the Microsoft Exchange server has been deployed.
When Kaspersky Security is installed, its transport agents are registered on the Microsoft Exchange server with the highest priority. Do not change the priority of Kaspersky Security transport agents. Doing so may reduce the effectiveness of protection.
Anti-Virus. Scans messages for viruses and other malicious objects. This module comprises an anti-virus kernel
and a storage for temporary objects, which is used for scanning objects in RAM. The storage is located in the working folder Store.
The Store folder is created in the application data storage folder (by default: <application setup folder>/data). You have to exclude it from scanning by anti-virus applications installed on the corporate network. Otherwise, Kaspersky Security may operate incorrectly.
Anti-Spam. Filters out unsolicited mail. After intercepting a message, E-mail Interceptor relays it for processing
by Anti-Spam. Copies of deleted messages can be stored in Backup.
A P P L I C A T I O N A R C H IT E C T U R E
15
Internal Application Management and Integrity Control Module. It is a Microsoft Windows service called
Kaspersky Security 8.0 for Microsoft Exchange Servers.
The module is started automatically in the following cases:
When the first message passes through the Microsoft Exchange server;
When the Administration Console attempts to connect to the Security Server, and on completion of the
Application Configuration Wizard.
This service does not depend on the state of the Microsoft Exchange Server (whether it is started or stopped), so the application can be configured when the Microsoft Exchange Server is stopped.
The Internal Application Management and Integrity Control Module should be running at all times. Do not end the Kaspersky Security 8.0 for Microsoft Exchange Servers service manually, as this will disable the Security Server and stop the scanning process.
BACKUP AND STATISTICS DATABASE
The application stores Backup data and application statistics in a special database deployed on a Microsoft SQL Server, the so-called the Backup and statistics database (hereinafter also database).
On being installed, the application can create a new database or use an existing database. When the application is removed, the database can be saved on an SQL server for future use.
Database settings
The Backup and statistics database settings are stored in the following configuration file:
<application setup folder>/Configuration/BackendDatabaseConfiguration.config
It is an editable XML file. It contains the following settings:
SqlServerName : name of the SQL server. It is specified by the application automatically as <SQL server
name>\<copy> based on information provided by the administration during installation of the application.
DatabaseName – name of the main database. It is specified by the application automatically based on
information provided by the administration during installation of the application.
FailoverPartner: settings (SQL server and instance) of the database mirror. They are specified by the
application automatically as <SQL server name>\<copy>.
We strongly advise against changing the names of the SQL server and primary database during operation of the application. The application should be stopped before such changes are made. Otherwise, the Backup and statistics database data will be partly lost.
Changes made to the configuration file become effective within one minute. Database mirroring
The application supports the Database Mirroring technology. If this technology is used in the configuration of your SQL server, the application will use it automatically. In other words, if the main Backup and statistics database fails or is disabled, the application automatically switched to using a database mirror. The application automatically switches back to the primary database as soon as it has been restored.
16
COMMON APPLICATION DEPLOYMENT
IN THIS SECTION
Microsoft Exchange Server roles and corresponding protection configurations .............................................................. 16
Basic application deployment models ............................................................................................................................. 17
Deploying the Administration Console separately from the Security Server.................................................................... 17
Application deployment in a server cluster ...................................................................................................................... 18
Application deployment in a Microsoft Exchange database availability group ................................................................. 18
MODELS
This section describes the Microsoft Exchange mail infrastructure configurations in which Kaspersky Security can be deployed.
MICROSOFT EXCHANGE SERVER ROLES AND
CORRESPONDING PROTECTION CONFIGURATIONS
The selection of application modules that can be installed depends on the role in which the Microsoft Exchange Server has been deployed.
Successful installation of Kaspersky Security requires that the protected Microsoft Exchange Server be deployed in at least one of the following roles:
On Microsoft Exchange 2007 or 2010:
Mailbox Server.
Hub Transport.
Edge Transport.
On Microsoft Exchange 2013:
Mailbox Server.
Client Access Server (CAS).
If Microsoft Exchange Server 2007 or 2010 is deployed as a Mailbox Server, Kaspersky Security interacts with it using the VSAPI 2.6 standard. In other cases, the Transport Agents technology is used for integration with the Microsoft Exchange Server. Please note that in the Hub Transport role, messages are first scanned by the application and then processed by Microsoft Exchange Transport Agents. In the Edge Transport role, the procedure is reversed – messages are first processed by Microsoft Exchange Transport Agents and then by the application.
If you install the application on a Microsoft Exchange 2013 server, the Anti-Virus module cannot be installed for the Mailbox Server role, and the Protection for the Mailbox role tab is missing from the application interface, while the
Protection for the Hub Transport role tab is available (for details on the application interface, see Administrator's Guide for Kaspersky Security 8.0 for Microsoft Exchange Servers).
C O M M O N A P P L I C A T I O N D E P L O Y M E N T M O D E L S
17
Example: In the case of the name.domain.local domain in Active Directory, the configuration will be written to the following thread in the directory service:
CN=KasperskyLab,CN=Services,CN=Configuration,DC=name,DC=domain,DC=local
BASIC APPLICATION DEPLOYMENT MODELS
You can choose one of the four basic application deployment models depending on your corporate server architecture:
The Security Server is installed on the computer hosting the Microsoft Exchange server. The Administration
Console is installed to the same host.
The Security Server is installed on the computer hosting the Microsoft Exchange server. The Administration
Console can be installed separately on any computer on the corporate network for remote management of the Security Server (see section "Deploying the Administration Console separately from the Security Server" on page 17).
The Security Server is installed in the same server cluster where the Microsoft Exchange server is deployed
(see section "Application deployment in a server cluster" on page 18). In this case, the Security Server and Administration Console should be installed together on each node of the cluster.
The Security Server is installed in the Database Availability Group (hereinafter also "DAG") (see section
"Application deployment in a Microsoft Exchange database availability group" on page 18). In this case, the Security Server and Administration Console should be installed together on each server belonging to the DAG.
DEPLOYING THE ADMINISTRATION CONSOLE
SEPARATELY FROM THE SECURITY SERVER
If necessary, you can install the Administration Console separately from the Security Server on any computer on the corporate network for remote management of the Security Server. If several administrators are working jointly, the Administration Console can be installed on each administrator's computer.
To connect the Administration Console to the Security Server deployed on a remote server, add the Kaspersky Security
8.0 for Microsoft Exchange Servers service to the trusted applications list of the remote computer's firewall, or allow RPC connections.
The administrator should have the following privileges in order for the Administration Console to work properly with the remote Security Servers and profiles:
Local Administrator privileges on the remote Security Servers to which the Administration Console is connected;
One of the following sets of rights:
Rights to write the configuration to the application thread in the Active Directory® service
CN=KasperskyLab,CN=Services,CN=Configuration,DC=<domain component>,DC=<domain component> and rights to read the Microsoft Exchange configuration thread;
Rights of a member of the Exchange Organization Administrators group (for Microsoft Exchange Server
2007);
Rights of a member of the Hygiene Management group (for Microsoft Exchange Server 2010);
Rights of a member of the Organization Management group (for Microsoft Exchange Server 2013);
Privileges to write to the application folder on the computer hosting the Administration Console.
I N S T A L L A T I O N G U I D E
18
APPLICATION DEPLOYMENT IN A SERVER CLUSTER
Kaspersky Security supports the following types of server clusters:
Single copy cluster (SCC)
Cluster continuous replication (CCR)
During setup the application recognizes a server cluster automatically.
The order in which the application is installed to different cluster nodes does not matter.
The specifics of Kaspersky Security installation on a server cluster are as follows:
Before installation of Kaspersky Security is completed on all cluster nodes, do not move the clustered mailbox
servers (CMS) between different cluster nodes.
Use a single database for all nodes of the cluster. To do so, specify a single database during Kaspersky
Security installation on all nodes of the cluster.
The account used to perform the installation procedure must be authorized to write to the Active Directory
configuration section.
If a firewall is enabled on the cluster, the Kaspersky Security 8.0 for Microsoft Exchange Servers service must
be added to the list of trusted applications on each node of the cluster. This is necessary to ensure the interaction between Kaspersky Security and Backup.
After installation to a cluster of servers, most of the application settings are stored in the Active Directory, and all cluster nodes use those parameters. Kaspersky Security automatically detects active cluster nodes and applies the Active Directory settings to them. However, the update settings that apply to the physical server have to be configured manually for each node of the cluster.
Using profiles for configuring servers in a cluster has the following particularities:
You can add cluster servers to a profile only all at once.
You can remove cluster servers from a profile only all at once.
The specifics of Kaspersky Security removal from a server cluster are as follows:
Do not move clustered mailbox servers (CMS) between nodes before application removal is completed.
When the application is removed from the active node of a cluster, all services of the Microsoft Exchange data
bank and all instances of the Microsoft Exchange database dependent on the application are stopped. Once the removal process is complete, the original state of these cluster resources is restored automatically.
After application removal the cluster configuration is stored in Active Directory and can be used to reinstall the
application.
APPLICATION DEPLOYMENT IN A MICROSOFT EXCHANGE
DATABASE AVAILABILITY GROUP
Kaspersky Security can be installed on servers belonging to a Microsoft Exchange Database Availability Group (DAG).
During installation, the application automatically recognizes the database availability group. The order in which the application is installed on nodes within the DAG is irrelevant.
The specifics of Kaspersky Security installation in the DAG are as follows:
C O M M O N A P P L I C A T I O N D E P L O Y M E N T M O D E L S
19
You should use a single database for all DAG nodes. This requires specifying a single database during
Kaspersky Security installation on all nodes of the DAG.
The account used to perform the installation procedure must be authorized to write to the Active Directory
configuration section.
If a firewall is enabled on the DAG servers, the Kaspersky Security 8.0 for Microsoft Exchange Servers service
must be added to the list of trusted applications on each server within the DAG. This is necessary to ensure the interaction between Kaspersky Security and Backup.
While the previous version of the application is being updated on all servers that are part of the DAG, it is strongly recommended to refrain from connecting to these servers using the Administration Console or editing application settings. Doing so may cause the update to end in an error, which may result in application malfunctions. If the connection needs to be established during an update, before connecting make sure that the Security Server version matches the version of the Administration Console used for establishing the connection.
After installation to a DAG, most of the application settings are stored in the Active Directory, and all DAG servers use those parameters. Kaspersky Security automatically detects active servers and applies the Active Directory settings to them. However, individual settings of the Microsoft Exchange Server have to be configured manually for each DAG server. Examples of individual settings of the Microsoft Exchange Server include: anti-virus protection settings for the Hub Transport role, anti-spam scan settings, Backup settings, settings of the Anti-Spam and Anti-Virus reports for the Hub Transport role, and Anti-Spam database update settings.
Using profiles to configure DAG servers has the following particularities:
You can add DAG servers to a profile only all at once.
When a DAG is added to a profile, all servers and all their roles (including the Hub Transport role) are added to
this profile.
You can remove DAG servers from a profile only all at once.
After removing Kaspersky Security from DAG servers, the configuration is stored in Active Directory and can be used to reinstall the application.
20
PREPARING FOR APPLICATION INSTALLATION
This section describes the steps to be taken as you prepare to install the application.
Before starting the installation of Kaspersky Security, make sure that the following components are available on the computer on which the application is being installed:
.NET Framework 3.5 SP1.
If this component is missing, you can download and install it by clicking the Download and install .Net Framework 3.5 SP1 link in the welcome window of the Kaspersky Security setup package.
The computer must be restarted after .NET Framework 3.5 SP1 installation. If you continue setup without restarting, it may cause problems in the operation of Kaspersky Security.
Microsoft Management Console 3.0
Microsoft Management Console 3.0 (MMC 3.0) is a part of the operating system in Microsoft Windows Server 2003 R2 and later versions. To install the application under earlier versions of Microsoft Windows Server, you need to upgrade MMC to version 3.0. You can do this in the welcome window of the setup package by clicking the Download and install MMC 3.0 link.
Make the following preparations before installing Kaspersky Security:
Grant the necessary privileges to the account under which the application will be installed
Grant the necessary privileges to the account under which the Kaspersky Security service will be launched
Granting privileges to the account under which the application will be installed
The account under which the application is installed requires the following privileges:
Local Administrator privileges on those Microsoft Exchange servers where the application will be installed
Domain Admin privileges for writing the application configuration to the Active Directory® service and reading
the configuration base of the Microsoft Exchange server
The dbcreator role on the SQL server for creating a database.
If the corporate security rules at your company prevent you from granting domain administrator privileges to the account under which the application is installed, this will prevent the application configuration from being written automatically to the Active Directory service, and the installation will return an error. If this is the case, prior to installing Kaspersky Security you have to manually create the necessary containers of the Active Directory service for writing the application configuration and grant them the necessary access privileges.
To create containers of the Active Directory service and grant them the necessary access privileges:
1. Grant the account under which the application is being installed the privileges to read the Active Directory thread: CN=Microsoft Exchange,CN=Services,CN=Configuration,DC=domain,DC=domain
2. Create a container in this thread: CN=KasperskyLab,CN=Services,CN=Configuration,DC=domain,DC=domain
3. Open the container properties and configure full access to the container for the following users:
Exchange Servers;
P R E P A R I N G F O R A P P L I C A T I O N I N S T A L L A T I O N
21
Example: In the case of the name.domain.local domain in Active Directory, the configuration will be written to the following thread in the directory service:
CN=KasperskyLab,CN=Services,CN=Configuration,DC=name,DC=domain,DC=local
<Account for installing the application>.
4. Configure full access to the container for the following objects:
for groups:
Exchange Organization Administrators (for Microsoft Exchange 2007);
Hygiene Management (for Microsoft Exchange 2010 and 2013);
or for all users under whose accounts the Administration Console should be started.
You can then start installation of the application. When the installation process is completed, application configuration files are created in the container.
Granting privileges to the account under which the Kaspersky Security 8.0 for Microsoft Exchange Servers service will be launched
The following privileges are required for the account under which the Kaspersky Security 8.0 for Microsoft Exchange Servers service is launched:
On Microsoft Exchange servers where the application is installed:
The "Log on as a service" privilege
Privileges to write to the application folder at C:\Program Files (x86)\Kaspersky Lab\Kaspersky Security 8.0
for Microsoft Exchange Servers
Privileges to read and write to the following registry branches:
HKLM\System\CurrentControlSet\Services\MSExchangeIS;
HKLM\SOFTWARE\Wow6432Node\Kaspersky Lab\Kaspersky Security for Microsoft Exchange Server.
In Active Directory:
Privileges to read and write to the following branch:
AD CN=KasperskyLab,CN=Services,CN=Configuration,DC=<domain component>,DC=<domain component>
Rights to read the configuration database of Microsoft Exchange server from Active Directory. Depending
on the installed version of Microsoft Exchange, you should add the user to the following group:
Exchange Organization Administrators (for Microsoft Exchange 2007);
Hygiene Management (for Microsoft Exchange 2010);
Organization Management (for Microsoft Exchange 2013).
After the user has been added to the group,Kaspersky Security 8.0 for Microsoft Exchange Servers service must be restarted on all the computers where it has been launched on behalf of that user. This is necessary to apply the changes made to the domain groups.
I N S T A L L A T I O N G U I D E
22
On the SQL server:
the db_owner role with respect to the application database.
Creating an SQL database
To operate, Kaspersky Security requires an instance of Microsoft SQL Server 2005 / 2008 / 2008 R2 (Standard, Express or Enterprise) / 2012 / 2012 Express installed on one of the network computers that hosts the database of Kaspersky Security. It is allowed to install the SQL server on the same computer with the application.
Either a database created during a previous installation of the application or a newly-created database can be used with Kaspersky Security.
You can choose the most convenient database creation option:
Automatically
The database is created automatically during installation of the application. The account under which installation is performed must have local access rights for the computer where Kaspersky Security is being installed and administrator privileges on the SQL server. If the SQL server is running on a domain controller, you must be a member of the Enterprise Admins and / or Domain Admins group.
Manually
You have to create the database manually before starting installation of the application. To be able to create the database, the account must have all access rights indicated in the table of privileges (see page 27).
You can also use a database created during a previous installation of Kaspersky Security. In this case, no additional actions are required.
23
UPGRADING FROM AN EARLIER VERSION
Kaspersky Security supports the upgrade of the previous version 8.0 Maintenance Pack 1 Critical Fix 1 to the current version of the application. Upgrading from earlier versions is not supported.
It is recommended to update the application on servers running within a DAG configuration in a sequence as soon as possible.
It is recommended to update the application in a sequence on all Security Servers and Administration Console deployed on the corporate network. If the application update has failed on any Security Server, you will be able to connect to this Security Server only using the Administration Console of the previous version.
SQL server hosting the application database must remain accessible during the update procedure. Otherwise the update will fail.
Parameter values and data of the previous application version will be transferred to the new version as follows:
The license for the previous version of the application remains effective for the new version. The end date of the
license validity period remains unchanged.
Application settings configured in the previous version will be applied without changes to the corresponding
settings in the new version.
The KSN and Reputation Filtering services are disabled. If you were using these services in the previous
version of the application, you have to re-enable them manually by selecting the relevant check boxes (for details see the Administrator's Guide to Kaspersky Security 8.0 for Microsoft Exchange Servers).
The value of the maximum size of objects scanned by the Anti-Spam component is set as follows:
The value of this setting remains without change if the administrator had configured the value for this
setting in the previous version of the application.
This setting has the default value of 1,536 KB (1.5 MB), if the administrator had not configured the value of
this setting in the previous version of the application.
This setting has a value of 20,480 KB if its value in the previous version of the application exceeded 20,480
KB.
Database structure will also be updated during the application update. Backup and statistical data will be
preserved.
Prior to updating, exit the Administration Console if it is started.
To update Kaspersky Security to the current version, perform the following steps:
1. Run the setup_ru.exe file included in the installation package on a computer with the installed version 8.0 Maintenance Pack 1 Critical Fix 1.
2. Click the link Kaspersky Security 8.0 for Microsoft Exchange Servers to initiate the application update procedure.
3. In the welcome screen of the application Setup Wizard that opens, click Install. The application Setup Wizard performs the update automatically.
4. When the update process finishes, click Finish to exit the application Setup Wizard.
All application components and modules installed on the computer are updated.
24
INSTALLING THE APPLICATION
IN THIS SECTION
Step 1. Checking the availability of the required components and installing them .......................................................... 25
Step 2. Viewing information about the start of the installation and reviewing the License Agreement ............................ 25
Step 3. Selecting the installation type.............................................................................................................................. 25
Step 4. Selecting application components and modules ................................................................................................. 26
Step 5. Configuring the connection of the application to the SQL database.................................................................... 27
Step 6. Selecting an account for launching the Kaspersky Security service ................................................................... 28
Step 7. Completing installation ........................................................................................................................................ 28
Kaspersky Security comprises two primary components: Security Server and Administration Console. The Security Server is always installed together with the Administration Console. The Administration Console can be installed separately on another computer for remote management of the Security Server.
You can choose one of the four component deployment models depending on your corporate server architecture:
The Security Server is installed on the computer hosting the Microsoft Exchange server. The Administration
Console is installed to the same host.
The Security Server is installed on the computer hosting the Microsoft Exchange server. The Administration
Console can be installed on any network computer within your corporate network for remote management of the Security Server.
The Security Server is installed in the same server cluster where the Microsoft Exchange server is deployed. In
this case, the Security Server and Administration Console should be installed together on each node of the cluster.
The Security Server can be installed in a Microsoft Exchange database availability group (DAG). In this case,
the Security Server and Administration Console should be installed together on each server belonging to the DAG.
During Kaspersky Security installation, services of MSExchangeTransport and MSExchangeIS will need to be restarted. Services will be restarted automatically without additional prompts.
Kaspersky Security is installed using a setup wizard that guides the user through every step of the setup process. The Back and Next buttons can be used to navigate between the screens of the Setup Wizard. The Cancel button allows
you to exit the setup wizard.
To start installation of the application,
run the setup.exe file from the application installation package.
This opens the welcome window of the install package.
I N S T A L L I N G T H E A P P L I C A T I O N
25
STEP 1. CHECKING THE AVAILABILITY OF THE REQUIRED
COMPONENTS AND INSTALLING THEM
The welcome screen of the installation package checks if the required components are installed.
If the components are not installed, you can do one of the following:
Download and install the .Net Framework 3.5 SP1 component by clicking the Download and install .Net
Framework 3.5 SP1 link (if the component is not installed already).
The computer must be restarted after .NET Framework 3.5 SP1 installation. If you continue setup without restarting, it may cause problems in the operation of Kaspersky Security.
Download and install the required component Microsoft Management Console 3.0 by clicking the Download
and install MMC 3.0 link (if the component is not installed).
Microsoft Management Console 3.0 (MMC 3.0) is a part of the operating system in Microsoft Windows Server 2003 R2 and later versions. To install the application on earlier versions of Microsoft Windows Server, update the MMC to version 3.0 by clicking the Download and install MMC 3.0 link.
Click the Kaspersky Security 8.0 for Microsoft Exchange Servers link to start the setup wizard.
This opens the welcome window of the install wizard.
STEP 2. VIEWING INFORMATION ABOUT THE START OF
THE INSTALLATION AND REVIEWING THE LICENSE
AGREEMENT
In the welcome screen of the setup wizard, view information about the start of Kaspersky Security installation on your computer, and click the Next button to proceed to the window with the License Agreement. License Agreement is an agreement between the application user and Kaspersky Lab.
Select the I accept the terms of the License Agreement check box, thereby confirming that you have read the License Agreement and accept its terms and conditions.
Kaspersky Security cannot be installed if you do not accept the terms and conditions of the License Agreement.
STEP 3. SELECTING THE INSTALLATION TYPE
At this step, select the type of application installation:
Typical. In this case, the setup wizard installs all of the available application components. During installation,
the setup wizard uses the default paths to the setup folder and data folders. If you choose this type of installation, the Setup Wizard proceeds to the Creating database window (see section "Step 5. Configuring the connection of the application to the SQL database (see page 27).
Custom. In this case, at the next step of the Setup Wizard you can select the application components to be
installed, and the destination folder for application installation, and data folders. If you choose this type of installation, the Setup Wizard proceeds to the Custom installation window (see section "Step 4. Selecting application components and modules" on page 26).
I N S T A L L A T I O N G U I D E
26
STEP 4. SELECTING APPLICATION COMPONENTS AND
MODULES
At this step, you have to select the application components and modules to be installed, and specify the paths to the setup folder and data folders. The set of components and modules available for installation differs depending on whether Microsoft Exchange server is installed on the computer and its role: Mailbox, Hub Transport, Edge Transport.
If you are installing the application on a Microsoft Exchange 2007 or 2010 server that is deployed in both Mailbox and Hub Transport roles, the following application components and modules are available for selection:
Administration Console;
Anti-Spam;
Anti-Virus for the Mailbox role;
Anti-Virus for the Hub Transport and Edge Transport roles.
If you are installing the application on a Microsoft Exchange 2007 or 2010 server that is deployed in the Hub Transport or Edge Transport role only, the following application components and modules are available for selection:
Administration Console;
Anti-Spam;
Anti-Virus for the Hub Transport and Edge Transport roles.
If you are installing the application on a Microsoft Exchange 2007 or 2010 server that is deployed in the Mailbox role only, the following application components and modules are available for selection:
Administration Console;
Anti-Virus for the Mailbox role.
If you install the application on a Microsoft Exchange 2013 server, the following components and modules are available for selection:
Administration Console;
Anti-Spam;
Anti-Virus for the Hub Transport role.
CAS Interceptor.
This component is displayed only if the Microsoft Exchange 2013 server is deployed in the Client Access Server (CAS) role alone.
The CAS Interceptor component is designed to improve spam detection. It is recommended for installation on all Microsoft Exchange 2013 servers deployed in the Client Access Server (CAS) role alone. This component is installed automatically together with the Anti-Spam component on Microsoft Exchange 2013 servers deployed in the Mailbox role (if you choose to install Anti-Spam).
In all other cases, only the Administration Console is available for installation.
Select the application components and modules that you want to install. To cancel your selection of components and return to the default selection, click the Reset button.
I N S T A L L I N G T H E A P P L I C A T I O N
27
To view information about the availability of free disk space needed for the installation of the selected components on the local drives, click the Disk usage button.
The path to the default installation folder is displayed in the lower part of the window in the Destination folder field. If necessary, specify a different destination folder by clicking the Browse button.
The Data folder field below shows the path to the default folder containing the application databases and objects that the application moves to Backup. If necessary, specify a different data folder by clicking the Browse button.
STEP 5. CONFIGURING THE CONNECTION OF THE
APPLICATION TO THE SQL DATABASE
At this step, you have to configure the settings of the application connection to the SQL database (also referred to as database) used to store configuration settings of the application and Backup data. You can create a new SQL database or use an existing database.
If the connection is to a remote SQL server, make sure that the remote SQL server is enabled to support TCP/IP as a client protocol.
Configure the settings of the connection to the database:
In the Name of SQL server field specify the name (or IP address) of the computer where SQL server is
installed, and the SQL server instance, for example, MYCOMPUTER\SQLEXPRESS. To select an SQL server in the network segment where the computer is located, click the Browse button
opposite the Name of SQL server field.
The relevant SQL server may be missing from the list of SQL servers if the service of the SQL server browser is not running on the computer hosting the SQL server.
In the Database name field, specify the name of the SQL database where the application will store the Backup
data, statistical information and its configuration information.
If the SQL server contains no database with the specified name, it will be created automatically by the setup wizard.
To be able to create a database on the SQL server, the account under which the installation is performed must have the dbcreator role. This account is used only to create the database during the operation of the Setup Wizard. It is not used when installation of Kaspersky Security is complete.
If you plan to use a centralized Backup and centralized storage of statistical data for several Security Servers, the same SQL server and database names must be specified for all the Security Servers. In this case, when installing the application on the second and subsequent Security Servers, specify the name of the database created during application installation on the first Security Server. If you do not intend to use centralized storages, you can specify your own SQL database for each Security Server.
If you deploy Kaspersky Security on a cluster or Microsoft Exchange DAG, using a common SQL database for all Security Servers is strongly recommended.
Select an account under which you want to create a database or connect to a database on an SQL server:
Active account. In this case, the database is created or connection to a database is performed under the
active account.
I N S T A L L A T I O N G U I D E
28
Other account. In this case, the database is created or connection to a database is performed under a
BASE PROTECTED E NTITY
PERMISSION
DESCRIPTION
DATABASE
CREATE TABLE
The right to add tables in the selected database
DATABASE
CREATE XML SCHEMA COLLECTION
The right to create collections of XML schemas in the selected database
SCHEMA
CONTROL
The right to control the dbo schema in the selected database
different account. You must specify the account name and password. You can also select an account by clicking the Browse button.
For operations with an existing database the selected account must have the following privileges:
Table 2. The privileges for connection to database
If a new database is created, the application automatically sets these permissions for the selected account.
STEP 6. SELECTING AN ACCOUNT FOR LAUNCHING THE KASPERSKY SECURITY SERVICE
At this step, specify the account to be used for launching the application service and connecting Kaspersky Security to the SQL server:
Local System account. In this case the application service will be started and the connection to the SQL server
established under the local system account.
Other account. In this case the application service will be started and the connection to the SQL server
established under a different account. You must specify the account name and password. You can also select an account by clicking the Browse button.
The specified account must have the necessary privileges (see section "Preparing to install" on page 20).
STEP 7. COMPLETING INSTALLATION
At this step, the application files are copied to the computer, the components are registered in the system, and temporary files are removed from Backup.
Click the Install button in the Setup Wizard window.
The Setup Wizard starts copying the application files to the computer, registering the components in the system, creating a database on the SQL server (if you chose to create a new database), and restarting the MSExchangeTransport and MSExchangeIS services.
MSExchangeTransport and MSExchangeIS services will be restarted automatically without additional prompts.
Once the files are copied and the components are registered in the system, the Setup Wizard displays a notification about the completed application installation.
To finish the installation, click the Next button.
The application configuration wizard starts automatically (see page 29). The application configuration wizard makes it possible to perform initial configuration of application settings.
G E T T I N G S T A R T E D
29
IN THIS SECTION
Step 1. Installing a key .................................................................................................................................................... 29
Step 2. Configuring server protection .............................................................................................................................. 30
Step 3. Enabling the KSN service ................................................................................................................................... 30
Step 4. Configuring the proxy server settings .................................................................................................................. 30
Step 5. Configuring notification settings .......................................................................................................................... 31
Step 6. Completing the configuration .............................................................................................................................. 31
GETTING STARTED
The Application Configuration Wizard lets you configure the minimum range of settings needed to build a system for centralized management of server protection.
The Application Configuration Wizard helps to:
Install a key
Configure the settings of server protection by the Anti-Virus and Anti-Spam components
Enable the use of Kaspersky Security Network (KSN)
Configure the proxy server
Select the notification method
The Application Configuration Wizard starts automatically when installation is completed. It provides instructions to be followed at every step. The Back and Next buttons can be used to navigate between the Application Configuration
Wizard screens. You can exit the Application Configuration Wizard at any step by closing its window. You can skip configuring the application and exit the Application Configuration Wizard by clicking the Cancel button in
the welcome window of the Application Configuration Wizard. You can configure the application in its Administration Console after launching the application.
STEP 1. INSTALLING A KEY
At this step, you can add a key for Kaspersky Security. You can also skip this step and install a key later, after the Application Configuration Wizard finishes and the application launches.
If no key has been added, Kaspersky Security works in "Administration only" mode without protecting the computer. To use Kaspersky Security in full functionality mode, you must add a key.
If you deploy Kaspersky Security on a Microsoft Exchange DAG, it suffices to install the key just once during application installation on any of the servers within this DAG. Once this is done, the Application Configuration Wizard will automatically detect the installed key during application installation on other servers within this DAG. In this case, you do not have to add keys for other servers.
Press the Add button. In the displayed File name dialog, specify the path to the key file (a file with the *.key extension) and click the Open button.
I N S T A L L A T I O N G U I D E
30
They key is installed as the active key. The active key lets you use Kaspersky Security for the duration of the license validity period on the terms of the End User License Agreement.
STEP 2. CONFIGURING SERVER PROTECTION
At this step, you can configure the settings of server protection against viruses and spam. The Anti-Virus and Anti-Spam modules start working as soon as you launch the application. Anti-Virus and Anti-Spam protection is enabled by default. The Enforced Anti-Spam Updates Service and automatic database updates are also used by default
The Enforced Anti-Spam Updates Service requires the computer hosting the Security Server to have a constant Internet connection.
If you do not want Anti-Virus and Anti-Spam to start working as soon as the application is launched, clear the Enable Anti-Virus protection and Enable Anti-Spam protection check boxes. You can enable protection later using the Administration Console.
To disable the Enforced Anti-Spam Updates Service, select the Enable Enforced Anti-Spam Updates Service check box.
To disable automatic updates of Anti-Spam and Anti-Virus databases from Kaspersky Lab servers as soon as the application is launched, clear the Enable automatic database updating check box.
STEP 3. ENABLING THE KSN SERVICE
At this step, you can enable the use of the KSN (Kaspersky Security Network) service for spam processing. This window appears only if you have selected the Anti-Spam component for installation (see section "Step 4. Selecting application components and modules" on page 26).
Kaspersky Security Network (KSN) is an infrastructure of online services providing access to Kaspersky Lab's online knowledge base with information about the reputation of files, online resources, and software. Data from Kaspersky Security Network ensures faster response by Kaspersky Security to new threats, improves the performance of some protection components, and reduces the risk of false positives (for details see Administrator's Guide for Kaspersky Security 8.0 for Microsoft Exchange Servers).
Access to the KSN service is regulated by a special KSN agreement. You can review the full text of the KSN agreement in a separate window by clicking the Full KSN agreement button.
To use KSN for spam analysis, select the I accept the KSN agreement and I want to use KSN check box, thereby confirming that you have read the KSN agreement and accept its terms.
STEP 4. CONFIGURING THE PROXY SERVER SETTINGS
At this step, you can configure proxy server settings. The application uses these settings to connect to Kaspersky Lab update servers while updating application databases and to connect to Kaspersky Security Network.
If you want the application to connect to Kaspersky Lab servers via a proxy server, select the Use proxy server check box and specify the settings of the connection to the proxy server in the relevant fields: proxy server address and port. By default, port 8080 is used.
To use authentication on the proxy server you have specified, select the Use authentication check box and enter the relevant information about the user account selected for that purpose in the Account and Password fields. Click the
button to select one of the existing accounts.
G E T T I N G S T A R T E D
31
STEP 5. CONFIGURING NOTIFICATION SETTINGS
At this step, you can configure the notifications sent by email. Notifications keep you informed about all Kaspersky Security events.
To configure the settings of notifications, in the Exchange web service address field specify the address of the web service used for sending emails via the Microsoft Exchange Server (by default, Microsoft Exchange Server uses the following address: https://<name_of_client_access_server>/ews/exchange.asmx).
Specify any account registered on the Microsoft Exchange Server in the Account field manually by clicking the Browse button, and enter the password of the selected account in the Password field.
Enter in the Administrator address field the destination mail address, for example, your e-mail.
Click the Test button to send a test message. If the test message arrives in the specified mailbox, it means that delivery of notifications is configured properly.
STEP 6. COMPLETING THE CONFIGURATION
At this step, the configured application settings are saved and the configuration process finishes.
By default, the Administration Console launches automatically after the configuration has been completed. To disable the automatic launch of the Administration Console, clear the Start Administration Console after Application Configuration Wizard completion check box.
Click the Finish button to exit the Application Configuration Wizard.
32
RESTORING THE APPLICATION
If the application encounters a failure while running (for example, if its executable files get damaged), you can restore the application using the Setup Wizard.
To restore Kaspersky Security:
1. Run the setup.exe file from the application installation package.
This opens the welcome window of the install package.
2. Click the Kaspersky Security 8.0 for Microsoft Exchange Servers link to open the welcome screen of the Setup Wizard and click Next.
3. In the Change, Restore or Remove the application window click the Restore button.
4. In the Restore window, click the Repair button.
This opens the Restore application window with information about restoring the application.
5. After the application has been restored, the Setup Wizard displays a notification about the completed application restoration. To finish restoring the application, click the Finish button.
During Kaspersky Security removal, services of MSExchangeTransport and MSExchangeIS will need a restart. Services will be restarted automatically without additional prompts.
Restoration of the application will not be possible if its configuration files are damaged. Removing and reinstalling the application is recommended in that case.
R E M O V I N G T H E A P P L I C A T I O N
33
REMOVING THE APPLICATION
You can remove the application using the Setup Wizard or standard Microsoft Windows installation and removal tools. If the application is installed on several servers, it has to be removed from each server.
To remove Kaspersky Security from a computer, perform the following steps:
1. Run the setup.exe file from the application installation package.
This opens the welcome window of the install package.
2. Click the Kaspersky Security 8.0 for Microsoft Exchange Servers link to open the welcome screen of the Setup Wizard and click Next.
3. In the Change, Restore or Remove the application window, click the Remove button.
4. In the Remove window, click the Remove button.
This opens the Remove application window with information about application removal.
5. In the warning dialog that opens, perform the following operations:
If you want the application to save the database on the SQL server during application removal, click Yes.
Backup data added by the application will be deleted from the database. Statistics data added by the application will be saved.
If you want the application to delete the database and statistics from the SQL server during application
removal, click No.
6. After the application has been removed, the Setup Wizard displays a notification about the completed application removal. To finish removing the application, click the Finish button.
During Kaspersky Security removal, services of MSExchangeTransport and MSExchangeIS will need a restart. Services will be restarted automatically without additional prompts.
You can also uninstall the application using the standard software management tools in Microsoft Windows.
34
CONTACTING THE TECHNICAL SUPPORT
IN THIS SECTION
Ways to receive technical support ................................................................................................................................... 34
Technical support by phone ............................................................................................................................................ 34
Obtaining technical support via Kaspersky CompanyAccount ........................................................................................ 35
Using a trace file and AVZ script ..................................................................................................................................... 36
SERVICE
This section provides information on how to receive technical support and the requirements for receiving help from Technical Support.
WAYS TO RECEIVE TECHNICAL SUPPORT
If you are unable to find a solution to your problem in the application documentation or in one of the sources of information about the application (see section "Sources of information about the application" on page 8), we recommend contacting Kaspersky Lab Technical Support. Technical Support specialists will answer your questions about installing or using the application.
Before contacting the Technical Support service, please read the support rules (http://support.kaspersky.com/support/rules).
You can contact Technical Support in one of the following ways:
By phone. This method allows you to consult our Russian-speaking or international Technical Support
specialists.
By sending a query from your Kaspersky Account on the Technical Support Service website. This method
allows you to contact Technical Support specialists through a request form.
Technical support is only available to users who purchased a license for the application. No technical support is available to users of trial versions.
TECHNICAL SUPPORT BY PHONE
If an urgent issue arises, you can call specialists at Russian-speaking or international Technical Support (http://support.kaspersky.com/support/contacts).
Before contacting Technical Support, please read the support rules (http://support.kaspersky.com/support/rules). This will help our support specialists to resolve your issue as soon as possible.
C O N T A C T I N G T H E T E C H N I C A L S U P P O R T S E R V I C E
35
OBTAINING TECHNICAL SUPPORT VIA KASPERSKY COMPANYACCOUNT
Kaspersky CompanyAccount (https://companyaccount.kaspersky.com) is a web service for sending requests to Kaspersky Lab and tracking the progress made in processing them by Kaspersky Lab experts.
To access Kaspersky CompanyAccount, you need register. You can register on the registration page (https://support.kaspersky.com/companyaccount/registration), unless you are already a registered user with rights to administer the account of your company in Kaspersky CompanyAccount.
The account of your company in Kaspersky CompanyAccount is created during the first registration of the license purchased by your company in Kaspersky CompanyAccount. All employees of your company who register in Kaspersky CompanyAccount will be subsequently linked to this account.
If a new account is created for your company during registration in Kaspersky CompanyAccount, by default you receive the rights to administer this account, i.e. the rights to manage this account in every possible way. If you are linked to an existing account of your company during registration, you receive limited rights by default.
For more details on Kaspersky CompanyAccount and what you can do with Kaspersky CompanyAccount, visit the page
http://support.kaspersky.com/faq/companyaccount_help of the Technical Support website.
An e-mail request to the Technical Support Service
You can send an online request to Technical Support in English, Russian and other languages.
Specify the following data in the fields of the online request form:
Request type
Application name and version number
Request description
You can also attach files to the electronic request form.
A Technical Support specialist sends an answer to your request submitted via the Kaspersky CompanyAccount system to the email address that you have specified on registering.
Request to the Virus Lab
Some requests must be sent to the Virus Lab instead of Technical Support.
You can send requests to the Virus Lab in the following cases:
If you suspect that a file or website contains a virus, but Kaspersky Security does not detect any threat. Virus
Lab specialists analyze the file or URL that you send. If they detect a previously unknown virus, they add a corresponding description to the database, which becomes available when Kaspersky Lab anti-virus applications are updated;
If Kaspersky Security detects a virus in a file or website, but you are certain that this file or website is safe.
You can also send requests to the Virus Lab from the request form page (http://support.kaspersky.com/virlab/helpdesk.html?LANG=en) without having a registered Kaspersky CompanyAccount.
I N S T A L L A T I O N G U I D E
36
USING A TRACE FILE AND AVZ SCRIPT
After you notify Technical Support Service specialists of a problem encountered, they may ask you to create a report that should contain information about your operating system, and send it to the Technical Support Service. Technical Support specialists may also ask you to create a trace file. A trace file helps track down step-by-step execution of application commands and detect the phase of application operation when an error occurs.
After Technical Support Service specialists analyze the data that you have sent, they can create an AVZ script and send it to you. Running AVZ scripts allows you to analyze active processes for malicious code, scan the system for malicious code, disinfect / delete infected files, and create reports on results of system scans.
37
KASPERSKY LAB ZAO
Kaspersky Lab’s web site:
http://www.kaspersky.com
Virus Encyclopedia:
http://www.viruslist.com
Anti-Virus Lab:
newvirus@kaspersky.com (only for sending probably infected files in archive format)
http://support.kaspersky.ru/virlab/helpdesk.html?LANG=en
(for queries to virus analysts)
Kaspersky Lab's web forum:
http://forum.kaspersky.com
Kaspersky Lab software is internationally renowned for its protection against viruses, malware, spam, network and hacker attacks, and other threats.
In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred developer of computer protection systems among home users in Russia, according to the COMCON survey "TGI-Russia 2009".
Kaspersky Lab was founded in Russia in 1997. Today, it is an international group of companies headquartered in Moscow with five regional divisions that manage the company's activity in Russia, Western and Eastern Europe, the Middle East, Africa, North and South America, Japan, China, and other countries in the Asia-Pacific region. The company employs more than 2000 qualified specialists.
Products. Kaspersky Lab’s products provide protection for all systemsfrom home computers to large corporate networks.
The personal product range includes anti-virus applications for desktop, laptop, and tablet computers, for smartphones and other mobile devices.
Kaspersky Lab delivers applications and services to protect workstations, file and web servers, mail gateways, and
firewalls. Used in conjunction with Kaspersky Lab’s centralized management system, these solutions ensure effective
automated protection for companies and organizations against computer threats. Kaspersky Lab's products are certified by the major test laboratories, are compatible with the software of many suppliers of computer applications, and are optimized to run on many hardware platforms.
Kaspersky Lab’s virus analysts work around the clock. Every day they uncover hundreds of new computer threats, create tools to detect and disinfect them, and include them in the databases used by Kaspersky Lab applications. Kaspersky Lab's Anti-Virus database is updated hourly; and the Anti-Spam database every five minutes.
Technologies. Many technologies that are now part and parcel of modern anti-virus tools were originally developed by Kaspersky Lab. It is no coincidence that many other developers use the Kaspersky Anti-Virus kernel in their products, including: SafeNet (USA), Alt-N Technologies (USA), Blue Coat Systems (USA), Check Point Software Technologies (Israel), Clearswift (UK), CommuniGate Systems (USA), Critical Path (Ireland), D-Link (Taiwan), M86 Security (USA), GFI (Malta), IBM (USA), Juniper Networks (USA), LANDesk (USA), Microsoft (USA), NETASQ (France), NETGEAR (USA), Parallels (Russia), SonicWALL (USA), WatchGuard Technologies (USA), ZyXEL Communications (Taiwan). Many of the company’s innovative technologies are patented.
Achievements. Over the years, Kaspersky Lab has won hundreds of awards for its services in combating computer threats. For example, in 2010 Kaspersky Anti-Virus received several top Advanced+ awards in a test administered by AV-Comparatives, a respected Austrian anti-virus laboratory. But Kaspersky Lab's main achievement is the loyalty of its
users worldwide. The company’s products and technologies protect more than 300 million users, and its corporate clients
number more than 200,000.
38
INFORMATION ABOUT THIRD-PARTY CODE
Information about third-party code is contained in a file named legal_notices.txt and stored in the application installation folder.
39
TRADEMARK NOTICE
Registered trademarks and service marks are the property of their respective owners.
Active Directory, Microsoft, SQL Server, Windows, Windows Server, and Windows Vista are trademarks of Microsoft Corporation registered in the USA and other countries.
Intel and Pentium are trademarks of Intel Corporation registered in the USA and other countries.
40
INDEX
A
Administration Console ................................................................................................................................................14
APPLICATION ARCHITECTURE.................................................................................................................................14
Application components ......................................................................................................................................... 14, 26
APPLICATION CONFIGURATION WIZARD................................................................................................................29
C
Clusters ........................................................................................................................................................................18
Configuring notification settings....................................................................................................................................31
Custom installation ................................................................................................................................................. 25, 26
D
Deployment models......................................................................................................................................................17
G
GETTING STARTED....................................................................................................................................................29
H
HARDWARE REQUIREMENTS...................................................................................................................................11
I
INITIAL CONFIGURATION ..........................................................................................................................................29
Installation
custom ....................................................................................................................................................................25
Installation types...........................................................................................................................................................25
INSTALLATION WIZARD .............................................................................................................................................24
INSTALLING THE APPLICATION................................................................................................................................24
K
Kaspersky Security Network ........................................................................................................................................30
Key ...............................................................................................................................................................................29
P
PREPARING FOR APPLICATION INSTALLATION.....................................................................................................20
Proxy server .................................................................................................................................................................30
R
REMOVING THE APPLICATION .................................................................................................................................33
RESTORING THE APPLICATION ...............................................................................................................................32
S
Security Server .............................................................................................................................................................14
Selecting components to install ....................................................................................................................................26
Server protection ..........................................................................................................................................................30
SOFTWARE REQUIREMENTS ...................................................................................................................................11
T
Traces
I N D E X
41
creating a trace file .................................................................................................................................................36
U
UPGRADING THE APPLICATION ...............................................................................................................................23
Z
ZAO ..............................................................................................................................................................................37
Loading...