Thank you for choosing our product. We hope that this document will help you in your work and provide answers to the
majority of your questions.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal
reproduction and distribution of this document or parts thereof will result in civil, administrative or criminal liability in
accordance with applicable law.
Any type of reproduction or distribution of any materials, including in translated form, is allowed only with the written
permission of Kaspersky Lab.
This document and the graphic images it contains may be used exclusively for informational, non-commercial or personal
purposes.
This document may be amended without prior notification. For the latest version, please refer to Kaspersky Lab’s web
site at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance or accuracy of any materials used in this document
the rights to which are held by third parties, or for potential damages associated with using such materials.
ABOUT THIS GUIDE .....................................................................................................................................................5
In this document .......................................................................................................................................................5
SOURCES OF INFORMATION ABOUT THE APPLICATION........................................................................................8
Data sources for independent searching ..................................................................................................................8
Discussing Kaspersky Lab applications on the forum ...............................................................................................9
Contacting the Sales Department .............................................................................................................................9
Contacting the Technical Writing and Localization Unit ............................................................................................9
KASPERSKY SECURITY 8.0 FOR MICROSOFT EXCHANGE SERVERS ................................................................10
HARDWARE AND SOFTWARE REQUIREMENTS .....................................................................................................11
Application components and their purpose .............................................................................................................14
Security Server modules .........................................................................................................................................14
Backup and statistics database ..............................................................................................................................15
COMMON APPLICATION DEPLOYMENT MODELS ..................................................................................................16
Microsoft Exchange Server roles and corresponding protection configurations......................................................16
Deploying the Administration Console separately from the Security Server ...........................................................17
Application deployment in a server cluster .............................................................................................................18
Application deployment in a Microsoft Exchange database availability group ........................................................18
PREPARING FOR APPLICATION INSTALLATION.....................................................................................................20
UPGRADING FROM AN EARLIER VERSION .............................................................................................................23
INSTALLING THE APPLICATION................................................................................................................................24
Step 1. Checking the availability of the required components and installing them ..................................................25
Step 2. Viewing information about the start of the installation and reviewing the License Agreement ....................25
Step 3. Selecting the installation type .....................................................................................................................25
Step 4. Selecting application components and modules.........................................................................................26
Step 5. Configuring the connection of the application to the SQL database ................................ ...........................27
Step 6. Selecting an account for launching the Kaspersky Security service ...........................................................28
Step 1. Installing a key ............................................................................................................................................29
Step 2. Configuring server protection .....................................................................................................................30
Step 3. Enabling the KSN service ...........................................................................................................................30
Step 4. Configuring the proxy server settings .........................................................................................................30
Step 6. Completing the configuration ......................................................................................................................31
RESTORING THE APPLICATION ...............................................................................................................................32
REMOVING THE APPLICATION .................................................................................................................................33
CONTACTING THE TECHNICAL SUPPORT SERVICE .............................................................................................34
Ways to receive technical support ..........................................................................................................................34
I N S T A L L A T I O N G U I D E
4
Technical support by phone ....................................................................................................................................34
Obtaining technical support via Kaspersky CompanyAccount ................................................................................35
Using a trace file and AVZ script.............................................................................................................................36
KASPERSKY LAB ZAO ...............................................................................................................................................37
INFORMATION ABOUT THIRD-PARTY CODE...........................................................................................................38
INDEX ..........................................................................................................................................................................40
5
ABOUT THIS GUIDE
IN THIS SECTION
In this document ................................................................................................................................................................ 5
This document is the Installation and Troubleshooting Guide for Kaspersky Security.
It is meant for technical specialists tasked with installing and administering Kaspersky Security and supporting
companies that use Kaspersky Security.
A specialist installing the application must be skilled in administering the operating system, installing and configuring
software. The specialist must review this Guide before installing the application.
This Guide is intended to do the following:
Describe the preparation for Kaspersky Security installation, the application installation and activation process.
Give advice on preparing the application for operation.
Help to restore or remove the application.
to provide additional sources of information about the application and ways to get technical support.
IN THIS DOCUMENT
This document includes the following sections:
Sources of information about the application (see page 8)
This section describes sources of information about the application and lists websites that you can use to discuss the
application's operation.
Kaspersky Security 8.0 for Microsoft Exchange Servers (see page 10)
This section describes the features of the application and provides brief information about application functions and
components. You will learn what items are included in the distribution kit and what services are available for registered
users of the application. This section provides information about the software and hardware requirements that a
computer must meet to allow installation.
Hardware and software requirements (see page 11)
To ensure proper operation of Kaspersky Security, your computer must meet the following requirements:
Application architecture (see page 14)
This section describes Kaspersky Security components and the logic of their interaction.
I N S T A L L A T I O N G U I D E
6
Typical deployment models for the application (see page 16)
This section covers the standard models of application deployment on a corporate network and the particulars of
integration with third-party software.
Preparing for installation (see page 20)
This section describes the steps to be taken as you prepare to install the application.
Upgrading from an earlier version (see page 23)
This section describes how you can upgrade an older version of the application to the current version.
Installing the application (see page 24).
This section contains step-by-step instructions for installing and removing the application.
Getting started (see page 29)
This section contains step-by-step instructions performing initial configuration of the application.
Restoring the application (see page 32)
This section contains instructions for restoring the application.
Removing the application (see page 33)
This section contains instructions for removing the application.
Contacting Technical Support (see page 34)
This section explains how to contact Kaspersky Lab Technical Support.
Kaspersky Lab ZAO (see page 37)
This section contains information about Kaspersky Lab ZAO.
Information about third-party code (see page 38)
This section provides information about third-party code used in the application.
Trademark notices (see page 39)
This section lists third-party trademarks used in this document.
Index
This section allows you to quickly find required information within the document.
DOCUMENT CONVENTIONS
The text in this document is accompanied by semantic elements - warnings, tips and examples that you are advised to
read thoroughly.
A B O U T T H IS GU I D E
7
SAMPLE TEXT
DOCUMENT CO NVENT IONS DESCRI PTION
Please note that...
Warnings are highlighted in red and enclosed in frames.
Warnings contain information about potential threats that may cause loss of data,
hardware or operating system malfunctions.
It is recommended that you use...
Notes are enclosed in frames.
Notes may contain helpful hints, recommendations, specific values for settings,
or noteworthy particular use cases.
Example:
...
Examples are given in blocks against a yellow background under the heading
"Example".
An update is...
The Databases are outdated event
occurs.
the following items are highlighted using italics:
new terms;
status variations and application events.
Press ENTER.
Use the ALT+F4 keyboard shortcut.
Names of keyboard keys appear in bold and are capitalized.
Names of keys linked with a + (plus) sign indicate key combinations. Such keys
should be pressed simultaneously.
Click the Enable button.
UI elements, for example, names of entry fields, menu items, buttons are in bold.
To configure a task schedule,
perform the following steps:
Introductory phrases of instructions are printed in italics and marked with an
arrow sign.
Enter help in the command line
The following message will appear:
Specify the date in DD:MM:YY format.
The following types of text content are set off with a special font:
command line text;
text of program messages output on the screen;
data that the user has to enter.
<User name>
Variables are enclosed in angle brackets. You should replace the variable with
the corresponding value in each case, omitting the angle brackets.
These elements are intentionally highlighted using graphics and typeface. Document conventions and examples of their
use are described in the table below.
Table 1. Document conventions
8
SOURCES OF INFORMATION ABOUT THE
IN THIS SECTION
Data sources for independent searching ........................................................................................................................... 8
Discussing Kaspersky Lab applications on the forum ....................................................................................................... 9
Contacting the Sales Department...................................................................................................................................... 9
Contacting the Technical Writing and Localization Unit..................................................................................................... 9
APPLICATION
This section describes sources of information about the application and lists websites that you can use to discuss the
application's operation.
You can select the most convenient source, depending on the urgency or importance of your question.
DATA SOURCES FOR INDEPENDENT SEARCHING
You can use the following sources to find information about the application:
Application page on the Kaspersky Lab website
Application page on the Technical Support website (Knowledge Base)
Online help
Documentation
If you cannot find a solution for your issue, we recommend that you contact Kaspersky Lab Technical Support (see
section "Technical support by phone" on page 34).
An Internet connection is required to use information sources on the Kaspersky Lab website.
The application page on Kaspersky Lab's web site
The Kaspersky Lab website features a separate page dedicated to each application.
Visit http://www.kaspersky.com/security-microsoft-exchange-servers to view general information about the application, its
features and functions.
A link to eStore is available on the http://www.kaspersky.com website. There you can purchase the application or renew
your license.
The application page on the Technical Support web site (in the Knowledge Base)
Knowledge Base is a section on the Technical Support website that provides advice on using Kaspersky Lab
applications. Knowledge Base comprises reference articles grouped by topics.
S O U R C E S O F I N F O R M A T I O N A B O U T T H E A P P L I C A T I O N
9
On the application page in Knowledge Base (http://support.kaspersky.com/exchange/security8.0) you will find articles
providing useful tips, advice, and answers to the frequently asked questions about purchasing, installing, and using the
application.
Articles may provide answers to questions relating not just to Kaspersky Security, but also to other Kaspersky Lab
applications. They also may contain news from Technical Support.
Online help
The online help of the application comprises help files.
Online help contains information about each window of the application: the list of settings, their descriptions and links to
the tasks using these settings.
Full help provides information about managing computer protection, configuring the application and solving typical user
tasks.
Documentation
On this page of the Kaspersky Lab website (http://www.kaspersky.com/product-updates/microsoft-exchange-server-
antivirus), you can download documents that will help you to install the application on computers on the corporate
network, configure application settings, and find information about the basic techniques for using the application.
DISCUSSING KASPERSKY LAB APPLICATIONS ON THE
FORUM
If your issue does not require an immediate solution, you can discuss it with Kaspersky Lab specialists and other users
on our Forum (http://forum.kaspersky.com).
On this forum you can browse existing threads, leave comments, and create new threads.
CONTACTING THE SALES DEPARTMENT
If you have any questions on how to select, purchase, or renew the application, you can contact our Sales Department
specialists in one of the following ways:
By calling our Headquarters in Moscow (http://www.kaspersky.com/contacts).
By sending a message with your question to sales@kaspersky.com.
Service is available in Russian and English.
CONTACTING THE TECHNICAL WRITING AND
LOCALIZATION UNIT
To contact the Technical Writing and Localization Unit, send an email to docfeedback@kaspersky.com. Please use
"Kaspersky Help Feedback: Kaspersky Security 8.0 for Microsoft Exchange Servers" as the subject line in your
message.
10
KASPERSKY SECURITY 8.0 FOR
MICROSOFT EXCHANGE SERVERS
Kaspersky Security 8.0 for Microsoft Exchange Servers is an application designed for protection of mail servers based on
Microsoft Exchange Server against viruses, Trojan software and other types of threats that may be transmitted via email, as well as spam and phishing.
Kaspersky Security provides anti-spam protection on the level of your corporate mail server, saving your employees the
trouble of deleting unwanted mail manually.
Kaspersky Security protects mailboxes, public folders, and relayed mail traffic on a Microsoft Exchange Server against
malware, spam, and phishing. The application scans all e-mail traffic passing through the protected Microsoft Exchange
Server.
Kaspersky Security can perform the following operations:
Scan mail traffic, incoming and outgoing mail, as well as the messages stored on a Microsoft Exchange Server
(including public folders) for malware. While scanning, the application processes the whole message and all its
attached objects. Depending upon the selected settings, the application disinfects and removes detected
harmful objects and provides users with complete information about them.
Filter unsolicited mail (spam) from mail traffic. The Anti-Spam component scans mail traffic for spam content. In
addition, Anti-Spam allows creation of black and white lists of sender addresses and supports flexible
configuration of anti-spam analysis intensity.
Scan mail traffic for phishing and malicious URLs.
Save backup copies of objects (an object consists of message body and its attachments) and spam messages
prior to their disinfection or deletion to enable subsequent restoration, if required, thus preventing the risk of
data losses. Configurable filters allow the user to easily locate specific stored objects.
Notify the sender, the recipient and the system administrator about messages that contain malicious objects.
Manage identical settings centrally in the group of Security Servers by means of profiles.
Maintain event logs, collect statistics and create regular reports on application activity. The application can
create reports automatically according to a schedule or by request.
Configure the application settings to match the volume and type of relayed mail traffic, in particular, define the
maximum connection wait time to optimize scanning.
Update the Kaspersky Security databases automatically or in manual mode. Updates can be downloaded from
the FTP and HTTP servers of Kaspersky Lab, from a local / network folder that contains the latest set of
updates, or from user-defined FTP and HTTP servers.
Re-scan messages for the presence of new viruses according to a schedule. This task is performed as a
background scan and has little effect on the mail server’s performance.
Perform anti-virus protection on storage level based on the list of protected storages.
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
11
HARDWARE AND SOFTWARE
REQUIREMENTS
For Kaspersky Security to work properly, the computer should meet the hardware and software requirements listed
below.
Hardware requirements
The hardware requirements for installing the Security Server are identical to the hardware requirements for a protected
Microsoft Exchange server. Depending upon the application settings and mode of operation, considerable disk space
may be required for Backup and other service folders (when using default settings,the Backup folder can occupy up to
5120 MB). The Administration Console is installed together with the Security Server.
The Administration Console can be also installed separately from the Security Server. Hardware requirements for
separate installation of the Administration Console: