(Kaspersky) Kaspersky Anti-Virus 8.0 For Windows Servers Enterprise Edition
(Kaspersky) Kaspersky Anti-Virus 8.0 For Windows Servers Enterprise Edition
Administrator's Guide
http://www.kaspersky.com
http://support.kaspersky.com
2
TABLE OF CONTENTS
ABOUT THIS DOCUMENT ............................................................................................................................................8
In this document .......................................................................................................................................................8
Document conventions ...........................................................................................................................................10
SOURCES OF INFORMATION ABOUT KASPERSKY ANTI-VIRUS ..........................................................................12
Sources for unassisted search of information .........................................................................................................12
Discussing Kaspersky Lab applications on the forum .............................................................................................13
KASPERSKY ANTI-VIRUS ..........................................................................................................................................14
What's new .............................................................................................................................................................15
Distribution kit .........................................................................................................................................................15
Hardware and software requirements .....................................................................................................................17
Requirements for the server on which Kaspersky Anti-Virus is deployed .........................................................17
Requirements for the protected network storage ..............................................................................................18
Requirements for the computer on which Kaspersky Anti-Virus is deployed ....................................................19
APPLICATION LICENSING .........................................................................................................................................20
About licenses ........................................................................................................................................................20
About the End User License Agreement .................................................................................................................20
About license certificates ........................................................................................................................................21
About keys ..............................................................................................................................................................21
About key files ........................................................................................................................................................21
USING KASPERSKY ANTI-VIRUS CONSOLE AND ACCESSING APPLICATION FEATURES ................................22
About Kaspersky Anti-Virus Console ......................................................................................................................22
Advanced settings after the installation of Kaspersky Anti-Virus Console on another computer ............................22
Adding Kaspersky Anti-Virus users to the KAVWSEE Administrators group on the protected server ...............23
Allowing network connections for Kaspersky Anti-Virus management service on the protected server ............23
Allowing network connections for Kaspersky Anti-Virus Console......................................................................24
Starting Kaspersky Anti-Virus Console from the Start menu ..................................................................................25
Kaspersky Anti-Virus Console window interface.....................................................................................................25
About access permissions for Kaspersky Anti-Virus functions................................................................................28
Configuring access rights to Kaspersky Anti-Virus functions ..................................................................................29
KASPERSKY ANTI-VIRUS ICON IN THE TASK TRAY NOTIFICATION AREA ..........................................................30
VIEWING PROTECTION STATUS AND KASPERSKY ANTI-VIRUS INFORMATION ................................................31
CONFIGURING GENERAL KASPERSKY ANTI-VIRUS SETTINGS IN KASPERSKY ANTI-VIRUS CONSOLE ........34
Procedure of configuring general Kaspersky Anti-Virus settings in Kaspersky Anti-Virus Console ........................34
TASK MANAGEMENT .................................................................................................................................................35
Creating an on-demand scan task ..........................................................................................................................35
Saving task after changing its settings....................................................................................................................35
Renaming tasks ......................................................................................................................................................36
Removing tasks ......................................................................................................................................................36
Starting / pausing / resuming / stopping tasks manually .........................................................................................36
Managing task schedules .......................................................................................................................................36
Enabling and disabling scheduled tasks ...........................................................................................................37
Configuring task launch schedule settings in Kaspersky Anti-Virus Console ....................................................37
Using user accounts to launch the task ..................................................................................................................38
About using accounts to launch tasks ...............................................................................................................38
Specifying a user account for running a task ....................................................................................................38
UPDATING KASPERSKY ANTI-VIRUS DATABASES AND MODULES .....................................................................39
About updating Kaspersky Anti-Virus databases ....................................................................................................39
About updating Kaspersky Anti-Virus modules .......................................................................................................39
Schemes for updating databases and modules of anti-virus applications used within an organization ..................40
Configuring update tasks ........................................................................................................................................42
3
ADM INISTRA TOR' S G UIDE
Selecting the update source, configuring connection with that update source ..................................................42
Optimizing the usage of the disk subsystem when running the Update of application databases task .............43
Configuring Update distribution task settings ....................................................................................................44
Configuring Update of application software modules task settings ...................................................................44
Update tasks...........................................................................................................................................................44
Update task statistics ..............................................................................................................................................45
Rolling back Kaspersky Anti-Virus database updates.............................................................................................46
Rolling back application module updates ................................................................................................................46
REAL-TIME PROTECTION ..........................................................................................................................................47
About real-time protection tasks .............................................................................................................................47
Configuring the Real-time protection of files task....................................................................................................47
Protection scope in the Real-time protection of files task ..................................................................................48
Defining protection scope in the Real-time protection of files task ..............................................................49
Pre-defined protection scopes .....................................................................................................................49
Creating protection scope............................................................................................................................49
About virtual protection scope .....................................................................................................................50
Creating a virtual protection scope: including dynamic drives, folders and files in the protection
scope...........................................................................................................................................................50
Configuring security settings for the selected node ...........................................................................................51
Selecting pre-defined security levels in the Real-time protection of files task..............................................51
Configuring security settings manually in Real-time protection of files task.................................................52
Working with templates in Real-time protection tasks .......................................................................................53
Saving security settings to a template .........................................................................................................53
Viewing security settings in a template ........................................................................................................53
Applying a template .....................................................................................................................................54
Deleting a template......................................................................................................................................54
Selecting protection mode ......................................................................................................................................54
Using the Heuristic Analyzer in Real-time file protection tasks ...............................................................................54
Real-time protection of files task statistics ..............................................................................................................55
Configuring Script Monitoring task ..........................................................................................................................56
Script scanning task statistics .................................................................................................................................56
List of files extensions scanned by default. Real-time protection of files ................................................................57
ON-DEMAND SCAN ....................................................................................................................................................58
About on-demand scan tasks .................................................................................................................................58
Configuring on-demand scan tasks ........................................................................................................................58
Scan scope in on-demand scan tasks...............................................................................................................59
About defining the scan scope in on-demand scan tasks ............................................................................60
Pre-defined scan scopes .............................................................................................................................60
Creating scan scope....................................................................................................................................60
Working with templates in on-demand scan tasks .......................................................................................61
Including network drives, folders or files in the scan scope .........................................................................62
Creating a virtual scan scope: including dynamic drives, folders and files in the scan scope......................63
Configuring security settings in the on-demand scan tasks ..............................................................................63
Selecting pre-defined security levels for on-demand scan tasks .................................................................64
Configuring security settings manually in on-demand scan tasks ...............................................................65
Using heuristic analyzer in on-demand scan tasks .................................................................................................66
Running background on-demand scan task ...........................................................................................................66
On-demand scan task statistics ..............................................................................................................................66
TRUSTED ZONE .........................................................................................................................................................68
About Kaspersky Anti-Virus trusted zone ...............................................................................................................68
Adding exclusions to the trusted zone ....................................................................................................................69
Adding processes to the list of trusted processes .............................................................................................69
Disabling the use of a trusted process in the trusted zone ................................................................................70
Disabling the features of real-time file protection and real-time protection of network storage systems
during backup. Exclusions of the trusted zone ..................................................................................................71
4
TABLE OF CONTENTS
5
ADM INISTRA TOR' S G UIDE
6
TABLE OF CONTENTS
7
ABOUT THIS DOCUMENT
The Administrator's Guide of Kaspersky Anti-Virus 8.0 for Windows Servers® Enterprise Edition (hereinafter also
referred to as "Kaspersky Anti-Virus") is intended for those who install and administer Kaspersky Anti-Virus, as well as
for those who provide technical support to organizations that use Kaspersky Anti-Virus.
In this Guide you can find information about configuring and using Kaspersky Anti-Virus.
This Guide will also help you to learn about sources of information about the application and ways to receive technical
support.
IN THIS SECTION
IN THIS DOCUMENT
The Administrator's Guide for Kaspersky Anti-Virus contains the following sections:
Kaspersky Anti-Virus
This section describes the functions, components, and distribution kit of Kaspersky Anti-Virus, and provides a list of
hardware and software requirements of Kaspersky Anti-Virus.
Application licensing
This section provides information about the main concepts related to licensing of the application.
8
ABO UT TH IS DO CUM ENT
Real-time protection
This section provides information about real-time protection tasks: Real-time protection of files task and Script
scanning task. This section also provides instructions on how to configure real-time protection tasks and manage the
security settings of a protected server.
On-demand scan
This section provides information about on-demand scan tasks and instructions on how to configure on-demand scan
tasks and manage security settings of on-demand scan tasks.
Trusted zone
This section provides information about the trusted zone of Kaspersky Anti-Virus, as well as instructions on how to add
objects to the trusted zone when executing Kaspersky Anti-Virus tasks.
Notification settings
This section provides information about ways in which users and administrators of Kaspersky Anti -Virus can be notified
about application events and the server protection status, as well as instructions on how to configure notifications.
9
ADM INISTRA TOR' S G UIDE
Technical support
This section describes the ways to receive technical support and the conditions on which it is available.
Glossary
This section contains a list of terms, which are mentioned in the document, as well as their respective definitions.
Trademark notices
This section lists trademarks reserved to third-party owners and mentioned in the document.
Index
This section allows you to quickly find required information through the document.
DOCUMENT CONVENTIONS
This document uses the following conventions (see table below).
Table 1. Document conventions
Warnings are highlighted in red and set off in a box. Warnings contain
Note that... information about actions that my have undesirable consequences.
Notes are set off in a box. Notes contain supplementary and reference
We recommend that you use... information.
Example: Examples are given in blocks against a yellow background under the heading
"Example".
...
10
ABO UT TH IS DO CUM ENT
Press ENTER. Names of keyboard keys appear in bold and are capitalized.
Press ALT+F4. Names of keys that are connected by a + (plus) sign indicate the use of a key
combination. These keys must be pressed simultaneously.
Click the Enable button. Names of application interface elements, such as text boxes, menu items, and
buttons, are set off in bold.
To configure a task schedule: Introductory phrases of instructions are italicized and accompanied by an arrow.
In the command line, type help The following types of text content are set off with a special font:
The following message then appears: Text in the command line
Specify the date in dd:mm:yy Text of messages displayed on the screen by the application
format.
Data that must be entered from the keyboard
<User name> Variables are enclosed in angle brackets. Instead of a variable, the
corresponding value should be inserted, omitting the angle brackets.
11
SOURCES OF INFORMATION ABOUT
KASPERSKY ANTI-VIRUS
This section lists the sources of information about the application. You can select the most suitable information source,
depending on the level of importance and urgency of the issue.
IN THIS SECTION
If you cannot find a solution for your issue on your own, we recommend contacting Kaspersky Lab Technical Support.
12
SOURCES OF INFO RMA TION AB OUT KAS PERS KY ANT I- VIRUS
13
KASPERSKY ANTI-VIRUS
Kaspersky Anti-Virus protects servers running on Microsoft® Windows® operating systems and network storages against
viruses and other computer security threats to which servers are exposed through file exchange. Kaspersky Anti -Virus is
designed for use on local area networks of medium to large organizations. Kaspersky Anti-Virus users are corporate
network administrators and specialists responsible for anti-virus protection of the corporate network.
Kaspersky Anti-Virus can be installed on servers in the following roles:
Terminal servers
Print servers
Application servers
Domain controllers
Network storage servers
File servers – these servers are more likely to get infected because they exchange files with user workstations.
Kaspersky Anti-Virus can be managed in the following ways:
Via Kaspersky Anti-Virus Console installed on the same server with Kaspersky Anti-Virus or on a different computer
Using commands in the command line
Via Administration Console of Kaspersky Security Center.
The Kaspersky Security Center application can also be used for centralized administration of multiple servers running
Kaspersky Anti-Virus.
It is possible to review Kaspersky Anti-Virus performance counters for the "System Monitor" application, as well as
SNMP counters and traps.
14
KASPERS KY ANT I- VIRUS
Backup
Kaspersky Anti-Virus stores encrypted copies of objects classified as Infected or Probably infected in Backup
before disinfecting or deleting them.
Administrator and user notifications
You can configure the application to notify the administrator and users who access the protected server about
events in Kaspersky Anti-Virus operation and the status of Anti-Virus protection on the server.
Importing and exporting settings
You can export Kaspersky Anti-Virus settings to an XML configuration file and import settings into Kaspersky
Anti-Virus from the configuration file. All Kaspersky Anti-Virus settings or settings for individual Kaspersky Anti-
Virus components can be saved in the configuration file.
IN THIS SECTION
WHAT'S NEW
Kaspersky Anti-Virus now includes the following features:
The feature of network storage protection over RPC and ICAP.
The following Microsoft Windows server operating systems are supported:
Microsoft Windows Server® 2012 Datacenter
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 Foundation
Microsoft Windows Server 2012 Standard
Microsoft Windows Server 2012 R2 Datacenter
Microsoft Windows Server 2012 R2 Essentials
Microsoft Windows Server 2012 R2 Foundation
Microsoft Windows Server 2012 R2 Standard.
The following Microsoft Windows desktop operating systems are supported:
Microsoft Windows 8;
Microsoft Windows 8 Enterprise
Microsoft Windows 8 Professional
Microsoft Windows 8.1
Microsoft Windows 8.1 Enterprise
Microsoft Windows 8.1 Professional.
DISTRIBUTION KIT
The distribution kit includes a welcome application that allows you to do the following:
Start the Kaspersky Anti-Virus Installation Wizard
Start the Kaspersky Anti-Virus Console Installation Wizard
Start the Installation Wizard that will install a plug-in for managing Kaspersky Anti-Virus via the Kaspersky
Security Center
15
ADM INISTRA TOR' S G UIDE
FILE PURPOSE
16
KASPERS KY ANT I- VIRUS
You can run files of the distribution kit from the Installation CD. If you have copied the distribution package files onto the
local drive beforehand, make sure that the structure of the distribution kit files has been preserved.
IN THIS SECTION
Requirements for the server on which Kaspersky Anti-Virus is deployed........................................................................ 17
Requirements for the protected network storage............................................................................................................. 18
Requirements for the computer on which Kaspersky Anti-Virus is deployed................................................................... 19
Kaspersky Anti-Virus can be installed without prior removal of Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise
Edition or Kaspersky Anti-Virus 6.0 / 8.0 for Windows Servers.
For installation and operation of Kaspersky Anti-Virus, Microsoft Windows Installer 3.1 must be installed on the server.
17
ADM INISTRA TOR' S G UIDE
You can install Kaspersky Anti-Virus on a server under one of the following 32-bit Microsoft Windows operating systems:
Windows Server 2003 Standard / Enterprise SP2
Windows Server 2003 R2 Standard / Enterprise SP2
Windows Server 2008 Standard / Enterprise / Datacenter SP1 or later
Windows Server 2008 Core Standard / Enterprise / Datacenter SP1 or later.
You can install Kaspersky Anti-Virus on a server under one of the following 64-bit Microsoft Windows operating systems:
Windows Server 2003 Standard / Enterprise SP2
Windows Server 2003 R2 Standard / Enterprise SP2
Windows Server 2008 Standard / Enterprise / Datacenter SP1 or later
Windows Server 2008 Core Standard / Enterprise / Datacenter SP1 or later
Windows Server 2008 R2 Standard / Enterprise / Datacenter SP1 or later
Windows Server 2008 R2 Core Standard / Enterprise / Datacenter SP1 or later
Windows Hyper-V® Server 2008 R2 SP1 or later
Windows Server 2012 Essentials / Standard / Foundation / Datacenter
Windows Server 2012 R2 Essentials / Standard / Foundation / Datacenter.
Windows Hyper-V Server 2012
Windows Hyper-V Server 2012 R2
You can install Kaspersky Anti-Virus on the following terminal servers:
Microsoft Terminal Services based on Windows 2003 Server;
Microsoft Remote Desktop Services based on Windows 2008 Server
Microsoft Remote Desktop Services based on Windows 2012 Server
Microsoft Remote Desktop Services based on Windows 2012 Server R2
Citrix Presentation Server™ 4.0, 4.5
Citrix® XenApp® 4.5, 5.0, 6.0, 6.5
Citrix XenDesktop® 7.0, 7.1, 7.5.
18
KASPERS KY ANT I- VIRUS
The computer should have Microsoft Windows Installer 3.1 in order to support installation and operation of Kaspersky
Anti-Virus Console.
You can install Kaspersky Anti-Virus Console on a computer running one of the following 32-bit Microsoft Windows
operating systems:
Windows Server 2003 Standard / Enterprise SP2
Windows Server 2003 R2 Standard / Enterprise SP2
Windows Server 2008 Standard / Enterprise / Datacenter SP1 or later
Microsoft Windows XP Professional with Service Pack 2 or later;
Microsoft Windows Vista® Editions
Microsoft Windows 7 Editions
Microsoft Windows 8;
Microsoft Windows 8 Enterprise / Professional
Microsoft Windows 8.1
Microsoft Windows 8.1 Enterprise / Professional.
You can install Kaspersky Anti-Virus Console on a computer running one of the following 64-bit Microsoft Windows
operating systems:
Windows Server 2003 Standard / Enterprise SP2
Windows Server 2003 R2 Standard / Enterprise SP2
Windows Server 2008 Standard / Enterprise / Datacenter SP1 or later
Windows Server 2008 R2 Standard / Enterprise / Datacenter SP1 or later
Windows Hyper-V Server 2008 R2 SP1 or later
Windows Server 2012 Essentials / Standard / Foundation / Datacenter
Windows Server 2012 R2 Essentials / Standard / Foundation / Datacenter.
Windows Hyper-V Server 2012
Windows Hyper-V Server 2012 R2
Microsoft Windows XP Professional Edition SP2 or later
Microsoft Windows Vista Editions
Microsoft Windows 7 Editions
Microsoft Windows 8;
Microsoft Windows 8 Enterprise / Professional
Microsoft Windows 8.1
Microsoft Windows 8.1 Enterprise / Professional.
19
APPLICATION LICENSING
This section provides information about the main concepts related to licensing of the application.
IN THIS SECTION
About licenses ................................................................................................................................................................. 20
About the End User License Agreement ......................................................................................................................... 20
About license certificates ................................................................................................................................................. 21
About keys ...................................................................................................................................................................... 21
About key files ................................................................................................................................................................. 21
ABOUT LICENSES
A license is a time-limited right to use the application, granted to you under the End User License Agreement.
A valid license entitles you to receive the following services:
Use of the application in accordance with the terms of the End User License Agreement
Technical support
The scope of service and the term of application use depend on the type of license under whic h the application has been
activated.
The following license types are possible:
A trial license is a free license intended for trying out the application.
A trial license is valid for a short period. When the trial license expires, Kaspersky Anti -Virus ceases to be fully
functional. To continue using the application, you must purchase a commercial license.
You can activate the application under a trial license one time only.
A commercial license is a paid license granted upon purchase of the application.
When a commercial license expires, the application continues to run but some of its features become
unavailable (for example, Kaspersky Anti-Virus databases cannot be updated). To continue using all the
features of Kaspersky Anti-Virus, you must renew your commercial license.
To ensure maximum protection of your computer against security threats, we recommend renewing the license before it
expires.
We recommend carefully reviewing the terms of the End User License Agreement before you start using the application.
You can review the terms of the End User License Agreement in the following ways:
During installation of Kaspersky Anti-Virus.
By reading the file license.txt. This document is included in the application's distribution kit.
By confirming that you agree with the End User License Agreement when installing the application, you signify your
acceptance of the terms of the End User License Agreement. If you do not accept the terms of the End User License
Agreement, you must abort application installation and must not use the application.
20
APPL IC ATION L ICE NS ING
ABOUT KEYS
A key is a sequence of bits with which you can activate and subsequently use the application in accordance with the
terms of the End User License Agreement. A key is generated by Kaspersky Lab.
You can add a key to the application by using a key file. After you add a key to the application, the key is displayed in the
application interface as a unique alphanumeric sequence.
Your key may be blocked by Kaspersky Lab if the terms of the End User License Agreement are violated. If your key is
blocked, a different key must be added in order for the application to work.
A key may be an "active key" or an "additional key".
An active key is the key that the application currently uses to function. A key for either a trial or commercial license may
be added as the active key. The application can have no more than one active key.
An additional key is a key that confirms the right to use the application but is not currently in use. An additional key
automatically becomes active when the license associated with the current active key expires. An additional key may be
added only if there is an active key.
A key for a trial license may be added only as an active key. A key for a trial license may not be added as an additional key.
21
USING KASPERSKY ANTI-VIRUS CONSOLE
AND ACCESSING APPLICATION FEATURES
This section provides information about Kaspersky Anti-Virus Console and describes how to manage Kaspersky Anti-
Virus using Kaspersky Anti-Virus Console installed on the protected server or a different computer.
IN THIS SECTION
If Kaspersky Anti-Virus Console and Kaspersky Anti-Virus are installed on different computers assigned to different
domains, limitations may be imposed on delivery of information from Kaspersky Anti-Virus to Kaspersky Anti-Virus
Console. For example, after a Kaspersky Anti-Virus task starts, its status may remain unchanged in the Console.
During installation of Kaspersky Anti-Virus Console the installer creates the kavfs.msc file in the Installation folder and
adds Kaspersky Anti-Virus snap-in to the list of isolated Microsoft Windows snap-ins.
You can start Kaspersky Anti-Virus Console from the Start menu. You can also start Kaspersky Anti-Virus Console on
the protected server by clicking the Kaspersky Anti-Virus icon in the taskbar notification area.
The Kaspersky Anti-Virus snap-in msc-file can be run or the Kaspersky Anti-Virus snap-in can be added to the existing
MMC console as a new element in the tree (see section "Kaspersky Anti-Virus Console window interface" on page 25).
Under a 64-bit version of Microsoft Windows, the Kaspersky Anti-Virus snap-in can be added only in the 32-bit version of
MMC (MMC32). To do so, open MMC via the command line by executing the command: mmc.exe /32.
Multiple Kaspersky Anti-Virus snap-ins can be added to a single Microsoft Management Console opened in authorizing
mode, in order to manage protection of multiple servers on which Kaspersky Anti-Virus is installed.
22
USIN G K ASPE RSKY ANT I- VIRU S CO NSOL E A ND AC CESS IN G APPL ICA T ION FE ATU RES
If the Windows firewall is enabled on the protected server, allow network connections for the process of the
Kaspersky Anti-Virus management service: kavfsgt.exe.
Windows firewall is enabled by default in all Windows server operating systems starting from Windows
Server 2008.
If you have not selected the Allow network connections for Kaspersky Anti-Virus Console check box on the
computer with Kaspersky Anti-Virus Console while installing the Console, you have to allow network
connections for Kaspersky Anti-Virus Console.
IN THIS SECTION
Adding Kaspersky Anti-Virus users to the KAVWSEE Administrators group on the protected server ............................. 23
Allowing network connections for Kaspersky Anti-Virus management service on the protected server .......................... 23
Allowing network connections for Kaspersky Anti-Virus Console .................................................................................... 24
You can connect to Kaspersky Anti-Virus under a local account if an account with the same name and password has
been registered on the protected server.
The names of settings may vary under different Windows operating systems.
To allow network connections for Kaspersky Anti-Virus management service on the protected server:
1. On the protected server running under Microsoft Windows Server 2008 select Start → Control panel →
Security → Windows firewall.
2. In the Windows firewall settings window, select the Change settings item.
3. In the list of predefined exceptions on the Exclusions tab check the flags: COM + Network access, Windows
Management Instrumentation (WMI) and Remote Administration.
4. Click the Add Program button.
5. Select the kavfsgt.exe file in the Add program window. This is located in the folder specified as a destination
folder during the installation of Kaspersky Anti-Virus Console using MMC.
6. Click OK.
7. Click OK in the Windows firewall settings window.
23
ADM INISTRA TOR' S G UIDE
Kaspersky Anti-Virus Console on the remote computer uses DCOM protocol to receive information about Kaspersky
Anti-Virus events (such as objects scanned, tasks completed, etc.) from the Kaspersky Anti-Virus management service
on the protected server. You need to allow network connections for Kaspersky Anti-Virus Console in the Windows
firewall settings in order to establish connections between Kaspersky Anti-Virus Console and the Kaspersky Anti-Virus
management service.
Take the following steps:
Make sure that anonymous remote access to COM applications is allowed (but not remote launch and activation
of COM applications).
In the Windows firewall open TCP port 135 and allow network connections for the executable file of the
Kaspersky Anti-Virus remote management process, kavfsrcn.exe.
The client computer on which Kaspersky Anti-Virus Console is installed uses port TCP 135 to access the
protected server and to receive a server response.
If Kaspersky Anti-Virus Console was opened while you were configuring the connection between the protected server
and the computer on which Kaspersky Anti-Virus Console is installed, close Kaspersky Anti-Virus Console, wait until the
Kaspersky Anti-Virus remote management process kavfsrcn.exe is terminated, and restart the Console. The new
connection settings will be applied.
To allow anonymous remote access to COM applications, take the following steps:
1. On a computer with Kaspersky Anti-Virus Console installed, open the Component Services console: select
Start → Run, enter the command dcomcnfg, and click OK.
2. Expand the Computers node in the Component Services console on your computer, open the context menu on
the My Computer node and select Properties item from the context menu.
3. On the COM Security tab of the Properties window, click the Edit limits button in the Access permissions
group of settings.
4. Make sure that the Allow Remote Access check box is selected for the ANONYMOUS LOGON user in the
Access Permission window.
5. Click OK.
To open TCP port 135 in the Windows firewall and to allow network connections for the Kaspersky Anti -Virus remote
management process executable file:
1. Close Kaspersky Anti-Virus Console on the remote computer.
2. Perform one of the following steps:
In Microsoft Windows XP or Microsoft Windows Vista:
a. In Microsoft Windows XP SP2 or later, select Start → Windows firewall.
in Microsoft Windows Vista, select Start → Control Panel → Windows firewall and in the Windows
firewall window select the command Change settings.
b. In Windows Firewall window (or Windows Firewall settings) click the Add port button on the
Exclusions tab.
c. In the Name field specify the part name RPC (TCP/135) or enter another name, for example
Kaspersky Anti-Virus DCOM, and specify port number (135) in the Port name field: 135.
d. Select TCP protocol.
e. Click OK.
f. Press the Add Program button on the Exclusions tab.
24
USIN G K ASPE RSKY ANT I- VIRU S CO NSOL E A ND AC CESS IN G APPL ICA T ION FE ATU RES
In Microsoft Windows 7:
a. Select Start → Control panel → Windows firewall, in the Windows firewall window select Allow
run of a program or component through Windows firewall.
b. In the Allow programs to communicate through Windows Firewall window click the Allow another
program... button.
3. Specify kavfsgt.exe file in the Add Program window. This is located in the folder specified as a destination
folder during the installation of Kaspersky Anti-Virus Console using MMC.
4. Click OK.
5. Click the OK button in the Windows firewall (Windows firewall settings) box.
25
ADM INISTRA TOR' S G UIDE
You can also enable the display of the description area and the action panel in the Kaspersky Anti -Virus Console
window.
Taskpad
The console tree displays the Kaspersky Anti-Virus node and the nested nodes of functional components of the
application.
The Kaspersky Anti-Virus nodes includes the following nested nodes:
Real-time protection: manage real-time protection of files and script scanning. There is a separate node for
each component:
Real-time protection of files.
Script scanning.
Network storage protection: manage network storage protection.
RPC: Protection of network-attached storages.
ICAP: Protection of network-attached storages.
26
USIN G K ASPE RSKY ANT I- VIRU S CO NSOL E A ND AC CESS IN G APPL ICA T ION FE ATU RES
On-demand scan: manage on-demand scan tasks. There is a separate node for each system task:
Scan at operating system startup.
Scan of critical areas.
Scanning quarantined objects.
Application integrity check.
A separate node is created for each user-defined task and for each group task created and sent to the server by
Kaspersky Security Center.
Quarantine: manage Quarantine settings and quarantined objects. The node contains a list of quarantined
objects.
Backup: manages Backup settings and handles objects in Backup. The node contains a list of backup copies.
Updates: manages updates for Kaspersky Anti-Virus databases and modules and copying updates to a local
update source folder. The node contains subnodes for administering each system update task and last
application database update rollback task:
Update of application databases.
Update of application software modules.
Copy updates.
Database update rollback.
A separate node is created for each task created and sent to the server by Kaspersky Security Center.
Logs: manage logs of real-time protection, network storage protection, on-demand scan, and update tasks;
manage the Kaspersky Anti-Virus audit log.
Licensing: add or delete Kaspersky Anti-Virus keys, view license details.
Details pane
The results pane displays information about the selected node. If the Kaspersky Anti-Virus node is selected, the results
pane displays information about the current protection status of the server, information about Kaspersky Anti-Virus, and
the status of its components.
Quick access bar and context menu for the Kaspersky Anti-Virus node
Using links on the quick access bar and context menu items of the Kaspersky Anti-Virus node, you can perform the
following operations:
Connect to another computer – connects to another server to manage Kaspersky Anti-Virus installed on it.
Start the application / stop the application – start or stop Kaspersky Anti-Virus. To carry out these
operations, you can also use the buttons on the toolbar.
Configure trusted zone settings – specify trusted processes and exclusion rules (see the section "Adding
exclusions to the trusted zone" on page 69). You can also specify tasks that use each trusted zone setting.
Modify user permissions – modify permissions of users and user groups to access the features of Kaspersky
Anti-Virus (see the section "Configuring rules for access to the features of Kaspersky Anti-Virus" on page 29).
Configure notification settings – configure user and administrator notifications about Anti-Virus events.
Hierarchical storage - configure Tiered storage settings.
Export settings – save the application settings in a configuration file in XML format (see the section "Exporting
settings" on page 99).
Import settings – restore the application settings from a configuration file in XML format (see the section
"Importing settings" on page 99).
About the application – view information about the application: number of the installed application version,
details of installed updates. You can also go to the website of Kaspersky Lab and the website of Technical
Support and read the End User License Agreement.
Properties - view and configure general Kaspersky Anti-Virus settings.
27
ADM INISTRA TOR' S G UIDE
FEATURE DESCRIPTION
Task management Ability to start / stop / pause / resume Kaspersky Anti-Virus tasks.
Creating and deleting on-demand scan tasks Ability to create and delete on-demand scan tasks
Edit settings Ability to:
view and edit general Kaspersky Anti-Virus settings;
import Kaspersky Anti-Virus from the configuration file and export them
to the configuration file;
view and edit task settings;
view and edit settings for task logs, system audit log, and notifications.
Manage logs Ability to delete task logs and clear the system audit log.
Read logs Ability to view Anti-Virus events in task logs and the system audit log
Read statistics Ability to view Kaspersky Anti-Virus statistics
Application licensing Ability to add and delete Kaspersky Anti-Virus keys
Read permissions Ability to view the list of Kaspersky Anti-Virus users and access privileges
of each user.
Edit permissions Ability to:
add and remove Kaspersky Anti-Virus users;
edit user permissions to access Kaspersky Anti-Virus functions.
28
USIN G K ASPE RSKY ANT I- VIRU S CO NSOL E A ND AC CESS IN G APPL ICA T ION FE ATU RES
29
KASPERSKY ANTI-VIRUS ICON IN THE
TASK TRAY NOTIFICATION AREA
Every time Kaspersky Anti-Virus automatically starts after a server reboot the Kaspersky Anti-Virus icon will be
displayed in the task tray notification area. It is displayed by default if the Kaspersky Anti-Virus taskbar icon
component was installed during application setup.
The Kaspersky Anti-Virus icon may have one of the two statuses:
Active (colored icon) if the Real-time protection of files or Script scanning task is being currently executed
(see page 47)
Inactive (black and white icon) if the Real-time protection of files and Script scanning tasks are not being
currently executed.
You can open the context menu of the Kaspersky Anti-Virus icon by right-clicking it.
The context menu offers several commands which can be used to display application windows (see the table below).
Table 4. Context menu commands displayed in the Kaspersky Anti-Virus tray icon
COMMAND DESCRIPTION
Open Kaspersky Anti-Virus Console Opens Kaspersky Anti-Virus Console (if installed).
About the application Opens the About the application window containing information about
Kaspersky Anti-Virus.
For registered Kaspersky Anti-Virus users, the About the application window
contains information about urgent updates that have been installed.
Hide Hides the Kaspersky Anti-Virus icon in the task panel notification area.
To display the application icon again, in the Start menu, select Programs
→Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise
Edition →Kaspersky Anti-Virus icon.
When configuring general Kaspersky Anti-Virus settings, the display of the Anti-Virus icon can be enabled or disabled
every time the Anti-Virus starts automatically following a server reboot (see section "Procedure for configuring general
Kaspersky Anti-Virus settings using Kaspersky Anti-Virus Console" on page 34).
30
VIEWING PROTECTION STATUS AND
KASPERSKY ANTI-VIRUS INFORMATION
To view information about the protection status of the server and protected network storage systems, as well as
about Kaspersky Anti-Virus,
select the Kaspersky Anti-Virus node in the console tree.
By default, information in the details pane of Kaspersky Anti-Virus is refreshed automatically every minute. You can
refresh information manually.
To refresh information in the Kaspersky Anti-Virus node manually,
select the Refresh command in the context menu of the Kaspersky Anti-Virus node.
The results pane of Kaspersky Anti-Virus Console displays information about the protection status of the server and
protected network storage systems, as well as information about Kaspersky Anti-Virus (see the table below).
Table 5. Information about server protection status
– one or several real-time protection tasks have not been run or have been stopped, or
the Critical areas of computer have not been scanned for a long time event has occurred
31
ADM INISTRA TOR' S G UIDE
Table 6. Information about the status of Kaspersky Anti-Virus databases and modules
– one of the following events has occurred: Application databases are out of date; New
critical update of application software modules is available; Critical updates for application
software modules are revoked; You must restart your computer to complete the update of
application software modules;
– the Databases are extremely out of date or Databases are corrupted event has
occurred.
Program database Update status of application databases – assessment of the update status of the
update. application databases.
It can take the following values:
Application databases are up-to-date – the application databases were updated no
more than 7 days ago (default)
Application databases are out of date – application databases were updated between 7
and 14 days ago (default);
Application databases are extremely out of date – the application databases were
updated more than 14 days ago (default).
You can change the thresholds for creation of the Application databases are out of date
and Application databases are extremely out of date events.
Application database release date – release date and time of the latest update installed for
the databases. The date and time are specified in UTC format.
Number of records in application databases – number of records on threats in the
application databases currently installed.
Last update of application databases – date and time when the application databases
were updated for the last time. The date and time are specified as of the protected server.
– license is active, more than 14 days are left until the license expiration
– license has expired; the application is not activated (no key has been added); the
End User License Agreement has been violated (for example, the key file is blacklisted).
License expiration date The expiration date of the license associated with the active key. If an additional key has
been added, the expiration date of the license associated with the additional key is displayed.
The Protection of network-attached storage section (see the table below) is displayed if the active key supports the
network storage protection feature.
32
VIEW IN G PROT ECT IO N S TATU S AN D KAS PERS KY ANTI - VIRUS INFO RM ATION
For detailed information and instructions on how to protect network storage systems using Kaspersky Anti-Virus please
refer to the Implementation Guide for Kaspersky Anti-Virus 8.0 for Windows Servers Enterprise Edition for network
storage protection.
33
CONFIGURING GENERAL KASPERSKY
ANTI-VIRUS SETTINGS IN KASPERSKY
ANTI-VIRUS CONSOLE
General Kaspersky Anti-Virus settings establish the general conditions on which the application operates. They allow
controlling of the number of working processes used by Kaspersky Anti-Virus, enable Kaspersky Anti-Virus task recovery
after an abnormal termination, maintain the tracking log, enable creating the memory dump file of Anti -Virus processes in
case of an abnormal termination, turn on or off the display of Kaspersky Anti-Virus icon each time Anti-Virus starts after
the server restart, and configure other general settings.
IN THIS SECTION
Procedure of configuring general Kaspersky Anti-Virus settings in Kaspersky Anti-Virus Console ................................. 34
Kaspersky Anti-Virus records information to trace files and memory dump files in non-encrypted format.
34
TASK MANAGEMENT
This section provides information about Kaspersky Anti-Virus tasks, how to create them, define their settings, start and
stop tasks, and set up a schedule for automatic startup and automatic stop of those tasks.
IN THIS SECTION
Creating an on-demand scan task................................................................................................................................... 35
Saving task after changing its settings ............................................................................................................................ 35
Renaming tasks............................................................................................................................................................... 36
Removing tasks ............................................................................................................................................................... 36
Starting / pausing / resuming / stopping tasks manually.................................................................................................. 36
Managing task schedules ................................................................................................................................................ 36
Using user accounts to launch the task ........................................................................................................................... 38
35
ADM INISTRA TOR' S G UIDE
To save changed task settings, open the context menu on the task name and select Save task from the context menu.
If after changing task settings another node in the console tree is selected without first selecting the Save task
command, the window for saving the settings appears. Click the Yes button in this window to save task settings or No to
leave the node without saving changes.
You can also edit the settings for each of the following tasks: Real-time file protection (see the section "Configuring the
Real-time file protection task" on page 47), Network storage protection, On-demand scan ("Configuring on-demand scan
tasks" on page 58), Update (see page 42).
RENAMING TASKS
Only user-defined tasks in the Kaspersky Anti-Virus Console can be renamed. System or group tasks cannot be
renamed.
To rename a task, take the following steps:
1. Open the context menu on the task name and select the Properties command.
2. In the Properties: <Task name > window, enter a new task name in the Name field and click the OK or Apply
button.
The task will be renamed. The operation will be logged in the system audit log (see page 85).
REMOVING TASKS
Only user-defined tasks in the Kaspersky Anti-Virus Console can be deleted; system or group tasks cannot be deleted.
To delete a task, take the following steps:
1. Open the context menu on the task name and select the Delete task command.
2. In the window that opens, click the Yes button to confirm the operation.
The task status will be deleted, and the operation will be registered into the system audit log (see page 85).
When an on-demand scan task is paused and resumed, Kaspersky Anti-Virus will resume the scan from that object on
which the task had been paused.
IN THIS SECTION
Enabling and disabling scheduled tasks.......................................................................................................................... 37
Configuring task launch schedule settings in Kaspersky Anti-Virus Console .................................................................. 37
36
TASK MANAGEMENT
Fields with the schedule settings of the on-demand scan task and the update task are unavailable if the launch
of that task is blocked by a policy of Kaspersky Security Center (see section "Disabling scheduled launch of the
local system tasks" on page 131).
After the task startup frequency has been specified, the time of the first task launch, and the date from
which the schedule applies, information about the calculated time for the next task launch will appear in the
top part of the window in the Next start field. Updated information about the estimated time of the next task
launch will be displayed each time you open the Properties: <Task name> window on the Schedule tab.
The Blocked by policy value is displayed in the Next start field if the active policy settings of Kaspersky
Security Center prohibit launching scheduled system tasks (see section "Disabling scheduled launch of
local predefined tasks" on page 131).
4. Using the Advanced tab configure the following schedule settings in accordance with your requirements.
a. To specify the maximum duration of a task, enter the number of hours and minutes you wish in the
Duration field in the Task stop settings group.
37
ADM INISTRA TOR' S G UIDE
b. To specify time interval within a 24-hour period in which a task execution is be paused, in the group Task
stop settings enter the start and end values of the interval in the Pause from… until field.
c. To specify the date at which the schedule will be disabled: select the Cancel schedule from check box
and select the date when schedule will be disabled using the Calendar window.
d. To enable launching of missed tasks: select the Run skipped tasks check box.
e. To enable the use of the "Randomize the task start within internal, min" setting, check the Randomize the
task start within interval of and specify the value for this setting in minutes.
5. Click the Apply button to save the changes that you have made in the Settings <Task>.
IN THIS SECTION
About using accounts to launch tasks ............................................................................................................................. 38
Specifying a user account for running a task ................................................................................................................... 38
Under Local System (SYSTEM) account it is possible to launch the update and on-demand scan tasks in which the Anti-
Virus accesses public folder on a different computer if this computer is registered in the same domain as the protected
server. In such a case the account Local System (SYSTEM) must have access permissions to these folders. Kaspersky
Anti-Virus will access the computer using permissions of the account Domain_name\Computer_name$.
The selected user must be registered on the protected server or in the same domain as this server.
38
UPDATING KASPERSKY ANTI-VIRUS
DATABASES AND MODULES
This section provides information about databases and application modules update tasks of Kaspersky Anti -Virus,
copying updates and rolling back databases updates of Kaspersky Anti-Virus, as well as instructions on how to configure
databases and application modules update tasks.
IN THIS SECTION
About updating Kaspersky Anti-Virus databases............................................................................................................. 39
About updating Kaspersky Anti-Virus modules ............................................................................................................... 39
Schemes for updating databases and modules of anti-virus applications used within an organization ........................... 40
Configuring update tasks................................................................................................................................................. 42
Update tasks ................................................................................................................................................................... 44
Update task statistics ...................................................................................................................................................... 45
Rolling back Kaspersky Anti-Virus database updates ..................................................................................................... 46
Rolling back application module updates ........................................................................................................................ 46
39
ADM INISTRA TOR' S G UIDE
Kaspersky Lab does not publish planned update packages on its update servers for automatic update; these can be
downloaded from the Kaspersky Lab website. The Update of application software modules task can be used to
receive information about the release of scheduled Kaspersky Anti-Virus updates.
Critical updates can be updated from the Internet to each protected server, or one computer can be used as intermediary
by copying all updates onto it and then distributing them to the servers. In order to copy and save updates without
installing them use the Copying updates task.
Before updates of modules are installed Kaspersky Anti-Virus creates backup copies of the previously installed modules.
If the application modules updating process is interrupted or results in an error, Kaspersky Anti-Virus will automatically
return to using the previously installed application modules. Application modules can be rolled back manually to the
previously installed updates.
During the installation of downloaded updates the Kaspersky Anti-Virus service automatically stops and then restarts.
Figure 1: Scheme for updating the databases and application software modules
40
UPDAT IN G KA SPER SKY ANT I- VIRUS DATABASES AND MODULES
41
ADM INISTRA TOR' S G UIDE
The frequency of After Administration Server has retrieved updates cannot be specified in the
Kaspersky Anti-Virus Console.
Configure the Update of application databases (Update of application software modules) task on each
of the protected servers and select the Kaspersky Security Center Administration Server as the updates
source for this task. Configure the task schedule.
If you plan to use Kaspersky Security Center administration server for distributing updates, install Network Agent, an
application component included in the distribution kit of Kaspersky Security Center, onto each of the protected servers.
This ensures interaction between the Administration Server and Kaspersky Anti-Virus on the protected server. For more
details about the Network Agent and its configuration using Kaspersky Security Center see the document Kaspersky
Security Center. Administrator's Guide.
42
UPDAT IN G KA SPER SKY ANT I- VIRUS DATABASES AND MODULES
4. If Custom HTTP or FTP servers, or network folders is selected, add one or multiple user-defined updates
sources. To specify a source, click the Custom HTTP or FTP servers, or network folders link and in the
Update servers window click the Add button. In the entry field define the address of the folder containing
update files on the FTP or HTTP server; specify a local or network folder in the UNC (Universal Naming
Convention) format. Click OK.
You can enable or disable the custom update sources that have been added: to disable the source added, clear
the check box in the list next to it; to enable the source, select the check box in the list next to it.
In order to change the order in which Kaspersky Anti-Virus accesses user-defined files, use the Move Up and
Move Down buttons to move the selected source to the beginning or to the end of the list, depending on
whether it is to be used before or after other sources.
To change the path to the source, select the source in the list and click the Modify button, make the required
changes in the entry field and press the ENTER key.
In order to remove a source, select it in the list and press the Delete button. The source will be deleted from
the list.
5. To use Kaspersky Lab update servers to retrieve updates in case the user-defined sources are unavailable,
select the Use Kaspersky Lab update servers if custom servers are not accessible check box.
6. On the Connection Settings tab, configure the connection with the update source.
take the following steps:
Specify the FTP server mode for connecting to the protected server;
if required, modify the FTP or HTTP server connection timeout;
if access to the proxy server is required for downloading updates from one of the specified sources,
describe proxy server access settings:
Accessing proxy server when connecting to update sources;
proxy server settings;
authentication method used when accessing the proxy server;
7. When the required settings have been configured, click the OK button in order to save changes.
This feature is available in Microsoft Windows Server 2008 and later versions of the operating system.
When using this feature while running the Update of application databases task, an extra logical drive may appear in
the operating system. This logical drive is discarded from the operating system after the task is completed.
To reduce the workload on the computer's disk subsystem when running the Update of application databases task:
1. In the console tree, expand the Update node and select the Update of application databases task.
2. Click the Properties link in the details pane to proceed to task configuration.
3. On the General tab, in the Disk I/O usage optimization section, define the following settings:
Select the Lower the load on the disk I/O check box.
In the RAM used for optimization field, specify the RAM volume in MB. The operating system will
temporarily allocate this RAM volume to store update files while running the task.
4. Click OK to save changes.
43
ADM INISTRA TOR' S G UIDE
UPDATE TASKS
Kaspersky Anti-Virus supports four system update tasks: Update of application databases, Update of application
software modules, Copying updates, and Database update rollback.
By default Kaspersky Anti-Virus connects to the updates source (one of Kaspersky Lab's update servers) every hour, by
automatically detecting proxy server settings in the network, and by not authenticating on access to the proxy ser ver.
Database update tasks can be configured (see page 42). When task settings are modified, Kaspersky Anti-Virus will
apply the new values at the next task launch.
For managing tasks in the Anti-Virus refer to the section "Managing tasks" (see page 35).
44
UPDAT IN G KA SPER SKY ANT I- VIRUS DATABASES AND MODULES
Copying updates
Kaspersky Anti-Virus downloads database and application module update files and saves them to the specified network
or local folder without applying them.
FIELD DESCRIPTION
45
ADM INISTRA TOR' S G UIDE
Before updates of application modules are applied, Kaspersky Anti-Virus creates backup copies of the modules currently
in use. If the modules updating process has been interrupted or has resulted in an error, Kaspersky Anti-Virus will
automatically return to using modules with the latest installed updates.
In order to roll back the application modules use the Microsoft Windows component Install and delete
applications.
Application modules can be rolled back manually to previously installed updates.
46
REAL-TIME PROTECTION
This section provides information about real-time protection tasks: Real-time protection of files task and Script
scanning task. This section also provides instructions on how to configure real-time protection tasks and manage the
security settings of a protected server.
IN THIS SECTION
About real-time protection tasks ...................................................................................................................................... 47
Configuring the Real-time protection of files task ............................................................................................................ 47
Selecting protection mode ............................................................................................................................................... 54
Using the Heuristic Analyzer in Real-time file protection tasks ........................................................................................ 54
Real-time protection of files task statistics ....................................................................................................................... 55
Configuring Script Monitoring task................................................................................................................................... 56
Script scanning task statistics.......................................................................................................................................... 56
List of files extensions scanned by default. Real-time protection of files ......................................................................... 57
47
ADM INISTRA TOR' S G UIDE
When task settings are modified (for example, a different protection area is specified), Kaspersky Anti-Virus will
immediately apply new settings in the running task. In the task execution log it will record the date and time of settings
modification and task configuration before and after modification.
To configure the Real-time protection of files task, perform the following steps:
1. Expand a real-time protection node in the console tree.
2. Select the Real-time protection of files subnode.
The server file resource tree and Security level (Standard mode) window are displayed on the Protection
scope settings tab. for the selected node of the tree of file resources.
3. Configure the task settings as necessary (see table below).
4. Open the context menu on the task name and select Save task in order to save changes to the task.
Table 10. Default Real-time protection of files task setting
Protection scope Entire server You can limit the protection scope.
Security settings Common settings for the entire protection scope; For nodes selected in the server file resources
security level – Recommended (see page 51). tree you can perform the following operations:
apply a different pre-defined security level
(see page 51);
edit security settings manually (see page 65);
save security settings of the selected node as
a template for later application to a different
node (see page 53).
Protection mode On access and modification You can select protection mode, i.e. define type
of access at which Kaspersky Anti-Virus will
scan objects.
Heuristic Analyzer The Medium security level is applied. The Heuristic Analyzer can be enabled or
disabled and the analysis level configured.
Trusted zone Used A unified list of exclusions can be applied to the
If Add objects using the not-a- selected on-demand scan tasks and the Real-
virusRemoteAdmin* mask to exclusions and time protection of files task.
Add exclusions specified by Microsoft have Creation and application of trusted zone (see
been selected, the remote administration page 68).
programs RemoteAdmin and files recommended
by Microsoft will be excluded.
IN THIS SECTION
IN THIS SECTION
Defining protection scope in the Real-time protection of files task .................................................................................. 49
Pre-defined protection scopes ......................................................................................................................................... 49
Creating protection scope ............................................................................................................................................... 49
About virtual protection scope ......................................................................................................................................... 50
Creating a virtual protection scope: including dynamic drives, folders and files in the protection scope ......................... 50
48
REAL -T IME P ROTE CT ION
Note that the node will be marked with the icon if all subnodes are selected but not the parent node itself. In such a
case files and folders that do not appear in this node will not be automatically included in the protection scope. To include
these in the protection scope the parent node should be included in it. Alternatively, "virtual copies" can be included in
Kaspersky Anti-Virus Console and these objects added to the protection scope.
The names of the virtual nodes in the protection scope are displayed in blue font.
The server file resources tree contains the following pre-defined protection scopes:
Local hard drives. Kaspersky Anti-Virus scans files on the server's hard drives.
Removable drives. Kaspersky Anti-Virus scans files on removable media, for example on CDs or USB drives.
Network. Kaspersky Anti-Virus scans files that are written to network folders or read from them by applications
running on the server. Kaspersky Anti-Virus does not scan files when such files are accessed by applications
from other computers.
Virtual drives. Dynamic folders and files and drives that are temporarily connected to the server can be
included in the protection scope, for example, common cluster drives (create virtual protection scope).
Virtual drives created using a SUBST command are not displayed in the server file resource tree in the Kaspersky Anti -
Virus Console. To include objects on the virtual drive in the protection scope, include the server folder with which this
virtual drive is associated in the protection scope.
Connected network drives will also not be displayed in the server file resources tree. To include objects on network
drives in the protection scope, specify the path to the folder which corresponds to this network drive in UNC format.
49
ADM INISTRA TOR' S G UIDE
if an individual disk of a certain type is to be included in the protection scope, expand the node that
contains the list of drives of this type and check the box next to the name of the required drive. For
example, in order to select removable drive F:, expand node Removable drives and check the box for
drive F:;
if you would like to include a single folder only on the disk in the protection scope, expand the server
file resource tree to display the folder you wish to include in the protection scope and check the box
next to its name. It is also possible to include files in the protection scope by using the same
procedure.
3. Open the context menu on the task name and select Save task in order to save changes to the task.
The task Real-time protection of files can be started only if at least one of the server file resources tree nodes
is included in the protection scope.
If a complex protection scope is specified, for example, if different security values for settings for multiple nodes
in the server file resource tree are specified, this may lead to a certain slowdown in the scan of objects when
they are accessed.
You can expand the protection / scan scope by adding individual virtual drives, folders, or files only if the protection /
scan scope is presented as a tree of file resources.
To add a virtual drive to the protection scope, take the following steps:
1. Expand the node Real-time protectionin the console tree and select the subnode Real-time file protection.
2. On the Configuring protection scope tab of the results panel, in the server file resource tree open the context
menu on the Virtual drives node and select the virtual drive name from the list of available names.
3. Check box next to the drive added to include the drive in the protection scope.
4. Open the context menu on the task name and select Save task in order to save changes to the task.
To add a virtual folder or virtual file to the protection scope, take the following steps:
1. Expand the node Real-time protectionin the console tree and select the subnode Real-time file protection.
2. On the Configuring protection scope tab in the results panel, in the server file resources tree, open the
context menu on the node where you wish to add a folder or file, and select one of the following options: Add
virtual folder or Add virtual file.
3. In the entry field specify name of folder (file). When specifying the file name, a mask can be used with the
special symbols * and ?.
50
REAL -T IME P ROTE CT ION
4. In the line with the name of folder created (or file created) select the check box to include this folder (file) in the
protection scope.
5. Open the context menu on the task name and select Save task, in order to save changes to the task.
IN THIS SECTION
Selecting pre-defined security levels in the Real-time file protection task ....................................................................... 51
Configuring security settings manually in Real-time file protection task .......................................................................... 52
Maximum performance
The Maximum performance security level is recommended if, apart from using Kaspersky Anti-Virus on servers and
workstations, there are additional computer security measures on your network, for example, firewalls are set up,
network users comply with existing security policies.
Recommended
The Recommended security level ensures an optimum combination of protection quality and degree of impact on the
performance of protected servers. This level is recommended by Kaspersky Lab experts as sufficient for protection of file
servers on most corporate networks. The Recommended security level is set by default.
Maximum Protection
The Maximum protection security level is recommended if you have higher requirements for computer security on your
organization's network.
Table 11. Pre-defined security levels and corresponding security setting values
51
ADM INISTRA TOR' S G UIDE
Note that the Objects protection, Use iChecker technology, Use iSwift technology, and Use heuristic analyzer
settings are not included in the settings of preset security levels. If you edit the Objects protection, Use iChecker
technology, Use iSwift technology, or Use heuristic analyzer security settings after selecting one of the preset
security levels, the security level that you have selected will not change.
To select one of the preset security levels, take the following steps:
1. Expand the node Real-time protectionin the console tree and select the subnode Real-time file protection.
2. On the Configuring protection scope tab of the details pane, in the server file resource tree, select the node
for the pre-defined security level you wish to select.
3. Make sure that this node is included in the protected area (see section "Creating protection scope" on page 49).
4. In the Security level window, select the security level you wish to apply from the list of security levels.
5. The window displays the list of security values for settings which correspond to the security level selected.
6. Open the context menu on the task name and select Save task in order to save changes to the task.
52
REAL -T IME P ROTE CT ION
IN THIS SECTION
Saving security settings to a template ............................................................................................................................. 53
Viewing security settings in a template............................................................................................................................ 53
Applying a template......................................................................................................................................................... 54
Deleting a template ......................................................................................................................................................... 54
53
ADM INISTRA TOR' S G UIDE
APPLYING A TEMPLATE
If a template is applied to a parent node, security settings from the template will also apply to all subnodes except for the
following nodes:
The template will not apply to the nodes for which you have configured settings individually. To apply security
settings from the template to all subnodes, the parent node in the server's file resources tree must be cleared
before the template is applied, and then checked again. Apply the template to the parent node. All subnodes will
have the same security settings as the parent node.
The template will not apply to virtual subnodes. If you wish to configure the settings of a virtual subnode in the
same way as those of the parent node, a virtual node should be selected and a template applied to it
individually.
To apply a template with specific security settings to the selected node, take the following steps:
1. Save the security values for settings to the template first (see page 61).
2. Expand the node Real-time protectionin the console tree and select the subnode Real-time file protection.
3. On the Protection scope settings tab of the details pane in the server file resources tree, open the context
menu on the node to which you want to apply the template, and select Apply template→ <Template name>.
4. Open the context menu on the task name and select Save task in order to save changes to the task.
DELETING A TEMPLATE
To delete a template, take the following steps:
1. Expand a real-time protection node in the console tree.
2. Open the context menu on the Real-time file protection task and select Settings templates.
3. In the Templates window, select the template to be deleted from the template list, and click the Delete button.
4. Click Yes in the confirmation window. The selected template will be deleted.
54
REAL -T IME P ROTE CT ION
FIELD DESCRIPTION
Objects not moved to Quarantine The number of objects that Kaspersky Anti-Virus attempted to quarantine but
was unable to do so, for example, due to insufficient disk space.
Objects not deleted The number of objects that Kaspersky Anti-Virus attempted but was unable to
delete, because, for example, access to the object was blocked by another
application.
Objects not scanned The number of objects in the protection scope that Kaspersky Anti-Virus failed to
scan because, for example, access to the object was blocked by another
application.
Objects not backed up The number of objects the copies of which Kaspersky Anti-Virus attempted to
save in Backup but was unable to do so, for example, due to insufficient disk
space.
Processing errors Number of objects whose processing resulted in an error.
Objects disinfected Number of objects disinfected by Kaspersky Anti-Virus.
Moved to Quarantine Number of objects quarantined by Kaspersky Anti-Virus.
Moved to Backup The number of object copies that Kaspersky Anti-Virus saved to Backup.
Objects deleted Number of objects deleted by Kaspersky Anti-Virus.
Password-protected objects Number of objects (archives, for example) that Kaspersky Anti-Virus missed
because they were password protected.
Corrupted objects The number of objects skipped by Kaspersky Anti-Virus as their format was
corrupted.
Objects processed Total number of objects processed by Kaspersky Anti-Virus.
55
ADM INISTRA TOR' S G UIDE
Execution of Blocked Kaspersky Anti-Virus always blocks the execution of scripts that have been
dangerous scripts recognized as dangerous.
Execution of Blocked It is possible to configure the actions which Kaspersky Anti-Virus will perform
probably on scripts it recognizes as probably dangerous: block or allow their execution.
dangerous scripts
Heuristic Analyzer The Medium security The Heuristic Analyzer can be enabled or disabled and the analysis level
level is applied. configured.
Trusted zone Used General list of exclusions which can be used in selected tasks.
About the creation and application of the trusted zone (see page )68
56
REAL -T IME P ROTE CT ION
FIELD DESCRIPTION
Scripts blocked Number of scripts, execution of which was blocked by Kaspersky Anti-Virus
Dangerous scripts detected Number of dangerous scripts detected
Probably dangerous scripts detected Number of probably dangerous scripts detected
Processed scripts Total number of processed scripts
57
ON-DEMAND SCAN
This section provides information about on-demand scan tasks and instructions on how to configure on-demand scan
tasks and manage security settings of on-demand scan tasks.
IN THIS SECTION
About on-demand scan tasks .......................................................................................................................................... 58
Configuring on-demand scan tasks ................................................................................................................................. 58
Using heuristic analyzer in on-demand scan tasks.......................................................................................................... 66
Running background on-demand scan task .................................................................................................................... 66
On-demand scan task statistics....................................................................................................................................... 66
58
ON-DE MA ND SCAN
Table 15. Default settings for newly created on-demand scan tasks
Scan scope Entire server You can change the scan scope (see page 60).
Security settings Common settings for the For nodes selected in the server file resources tree you can
entire scan scope correspond perform the following operations:
to the security level
Select a different preset security level (see page 64)
Recommended.
Edit security settings manually (see page 65).
You can save a set security settings for a selected node as a
template to use later for a different node (see page 61).
Heuristic Analyzer Enabled with Medium The Heuristic Analyzer can be enabled or disabled and the
analysis level analysis level configured.
Trusted zone Used The integral list of exclusions that you can apply in selected on-
RemoteAdmin remote demand scan tasks, as well as in the Real-time protection of
administration utilities are files, Script scanning, and RPC: Protection of network-attached
excluded if you selected Add storages:
objects using the not-a- Also learn about the creation and use of a trusted zone (see
virusRemoteAdmin* mask to page 68).
exclusions when installing
Kaspersky Anti-Virus.
IN THIS SECTION
Scan scope in on-demand scan tasks ............................................................................................................................. 59
Configuring security settings in the on-demand scan tasks............................................................................................. 63
IN THIS SECTION
About defining the scan scope in on-demand scan tasks................................................................................................ 60
Pre-defined scan scopes ................................................................................................................................................. 60
Creating scan scope........................................................................................................................................................ 60
Working with templates in on-demand scan tasks........................................................................................................... 61
Including network drives, folders or files in the scan scope ............................................................................................. 62
Creating a virtual scan scope: including dynamic drives, folders and files in the scan scope ......................................... 63
59
ADM INISTRA TOR' S G UIDE
Virtual drives created using a SUBST command are not displayed in the server file resource tree in the
Kaspersky Anti-Virus Console. In order to scan objects on a virtual drive, include the server folder with which
this virtual drive is associated.
Connected network drives will also not be displayed in the server file resources tree. To include objects on network
drives in the scan scope, specify the path to the folder which corresponds to this network drive in UNC format.
60
ON-DE MA ND SCAN
If you modify the scan scope in the Scan at system startup and Scan of critical areas tasks, you can restore the
default scan scope in these tasks by restoring Kaspersky Anti-Virus itself (Start > Programs > Kaspersky Anti-Virus
8.0 for Windows Servers Enterprise Edition > Modify or Remove). In the wizard, check the box named Restore
recommended program settings.
To define the scan scope, take the following steps:
1. Expand the On-demand scan node in the console tree.
2. Select on-demand task, scan scope you wish to create.
3. The Server file resource tree will be displayed on the Scan scope settings tab of the details pane. In a new on-
demand scan task, all scopes of the protected server are included in the scan scope by default.
4. take the following steps:
To select the nodes to be included in the scan scope, clear the My Computer check box and perform the
following:
if you wish to include all drives of the same type in the scan scope, select the check box next to the
name of the required disk type;
if you wish to include an individual disk in the scan scope, expand the node that contains the list of
drives of this type and check the box next to the name of the required drive. For example, to select
removable drive F:, expand the Removable drives node and select the check box for drive F:.
If you would like to include a single folder on the disk in the scan scope, expand the server file
resource tree to display the folder required check the box next to its name. Files can also be included
in the scan scope by using the same procedure.
To exclude an individual node from the scan scope, expand the server file resource tree to display the node
required and clear the box next to its name.
5. Open the context menu on the task name and select Save task in order to save changes to the task.
Please refer to the following sections for information about including in the scan scope:
a network drive, folder or file (see page 62);
a dynamic drive, folder or file (see page 62).
IN THIS SECTION
Saving security settings to a template ............................................................................................................................. 61
Viewing security settings in a template............................................................................................................................ 62
Applying a template......................................................................................................................................................... 62
Deleting a template ......................................................................................................................................................... 62
After you have configured security settings for any node in the server file resource tree in the on-demand scan task, this
set of settings can be saved to a template. This template can then be used to configure the security settings of other
nodes in the same task or in other on-demand scan tasks.
Templates created in the On-demand scanning task cannot be used for the security settings in the Real-time
protection of files and RPC: Protection of network-attached storages:
To save a set of security settings to a template, take the following steps:
1. Select the On-demand scan in the console tree.
2. Select the on-demand scan task whose security settings you wish to save to a template.
3. On the Scan scope settings tab, in the server file resource tree, select the node whose security settings you
wish to save.
4. On the General tab of the Security settings window, click the Save as template button.
61
ADM INISTRA TOR' S G UIDE
5. In the Template properties window, enter the name of the template in the Template name field.
6. Enter additional template information in the Description field.
7. Click OK. A template with the set of values for settings will be saved.
To view security settings in a template that you have created, perform the following steps:
1. Open the context menu on the On-demand scan node in the console tree and select Templates of settings.
The Templates window displays the list of templates that you can apply to the on-demand scan tasks.
2. To view information and security settings in a template, select the template from the list and click the View
button.
The name of the template and additional information is displayed on the General tab. The Properties tab lists
the security settings saved in the template.
If you apply a template to a parent node, the security settings from the template will also apply to all subnodes except in
the following cases:
The template will not apply to the nodes for which you have configured settings individually. To apply security
settings from the template to all subnodes, the parent node in the server's file resources tree must be cleared
before the template is applied, and then checked again. Apply the template to the parent node. All subnodes will
have the same security settings as the parent node.
The template is not applied to network drives, folders and files.
To apply a template with security settings, take the following steps:
1. Save the security values for settings to the template first (see page 53).
2. Select the On-demand scan in the console tree.
3. Select the on-demand scan task to which the security settings are to be applied.
4. On the Scan scope settings tab, in the tree of server file resources, open the context menu on the node to
which you want to apply the template, and select Apply template → <Template name>.
5. To save changes click the OK button in the Security settings window.
Users cannot scan network folders while using the Local system account.
To add a network place to the scan scope, take the following steps:
1. Expand the On-demand scan node in the console tree.
2. Select the on-demand scan, the scan scope of which a network path is to be added to.
3. On the Scan scope settings tab open the context menu on the Network node and select Add network folder
or Add network file.
4. Enter the path to network folder or file in UNC format and click the ENTER key.
5. Check the box next to the network object added in order to include it in the scan scope.
62
ON-DE MA ND SCAN
6. If necessary, change the security settings for the network object added (see section "Configuring security
settings in the on-demand scan task" on page 63).
7. Open the context menu on the task name and select Save task in order to save changes to the task.
You can expand the protection / scan scope by adding individual virtual drives, folders, or files only if the protection /
scan scope is presented as a tree of file resources.
To add a virtual drive to the scan scope, take the following steps:
1. Expand the On-demand scan node in the console tree.
2. Select the on-demand scan task in which you wish to create a virtual scan scope to open the task.
3. On the Scan scope settings tab of the results panel, in the server file resource tree open the context menu on
the Virtual drives node and select the virtual drive name from the list of available names.
4. Check the box next to the drive added in order to include the drive in the scan scope.
5. Open the context menu on the task name and select Save task in order to save changes to the task.
To add a virtual folder or virtual file to the scan scope, and take the following steps:
1. Expand the On-demand scan node in the console tree.
2. Select the on-demand scan task in which you wish to create a virtual scan scope to open the task.
3. On the Scan scope settings tab of the results pane, in the tree of server file resources, open the context menu
on the node of the virtual drive to which you want to add a folder or a file, and select the Add virtual folder or
Add virtual file command from the context menu.
4. In the entry field specify name of folder (file). You can use a folder (file) name mask. Use special symbols * and
? for the mask.
5. In the line with the name of folder created (or file created) select the check box to include this folder (file) in the
scan scope.
6. Open the context menu on the task name and select Save task in order to save changes to the task.
IN THIS SECTION
63
ADM INISTRA TOR' S G UIDE
Maximum performance
The Maximum performance security level is recommended if, apart from using Kaspersky Anti-Virus on servers and
workstations, there are additional computer security measures on your network, for example, firewalls are set up,
network users comply with existing security policies.
Recommended
The Recommended security level ensures an optimum combination of protection quality and degree of impact on the
performance of protected servers. This level is recommended by Kaspersky Lab experts as sufficient for protection of file
servers on most corporate networks. The Recommended security level is set by default.
Maximum Protection
The Maximum protection security level is recommended if you have higher requirements for computer security on your
organization's network.
Table 16. Pre-defined security levels and corresponding security setting values
Do not detect No No No
Stop scan if it takes longer than (sec) 60 sec. No No
Do not scan compound objects larger than 8 MB No No
(MB)
Scan alternate NTFS streams Yes Yes Yes
Scan disk boot sectors and MBR Yes Yes Yes
Scan composite objects SFX archives* Archives* Archives*
Packed objects* SFX archives* SFX archives*
Embedded OLE- Packed objects* email databases*
objects*
Embedded OLE- plain mail*
objects*
Packed objects*
Embedded OLE-
objects*
* New and modified * All objects * All objects
objects only
Offline file processing Yes Yes Yes
64
ON-DE MA ND SCAN
Note that such security settings as Use iChecker technology, Use iSwift technology, and Use heuristic analyzer and
Check Microsoft signature in files are not included in the settings of preset security levels. If the status of such settings
as Use iChecker technology, Use iSwift technology, Use heuristic analyzer, or Check Microsoft signature in files
is changed, the preset security level that you have selected will not change.
To select one of the preset security levels, take the following steps:
1. Select the On-demand scan in the console tree.
2. Select the on-demand scan task whose security settings you wish to configure.
3. On the Scan scope settings tab of the details pane select the scan scope node for which you wish to select a
pre-defined security level.
4. Make sure that this node is included in the scan scope (see page 60).
5. In the Security level window, select the security level to be applied.
The window displays the list of security settings corresponding to the security level selected.
6. Open the context menu on the task name and select Save task in order to save changes to the task.
65
ADM INISTRA TOR' S G UIDE
On the Hierarchical storage tab, select the method by which offline files are processed.
You can specify a method of processing offline files only if you have selected a method used by the HSM
system to determine the location of files to be scanned in advance.
7. After the required security settings have been configured, open the context menu on the task name and select
Save task in order to save changes in the task.
If you enable or disable background mode for the task running, task priority will not change immediately but
only when it is next run.
66
ON-DE MA ND SCAN
To view the statistics of an on-demand scan task, take the following steps:
1. Expand the On-demand scan node in the console tree.
2. Select the on-demand scan task whose statistics you wish to view.
3. On the Overview and management tab of the details pane in the Statistics section, click the Complete
statistics link.
You can view the following information about objects processed by Kaspersky Anti-Virus since it was started until the
current time (see the table below).
Table 17. On-demand scan task statistics
FIELD DESCRIPTION
Detected Number of objects detected by Kaspersky Anti-Virus. For example, if Kaspersky Anti-Virus
detects one malware program in five files, the value in this field increases by one.
Infected objects detected Number of objects found by Kaspersky Anti-Virus to be infected.
Probably infected objects Number of objects found by Kaspersky Anti-Virus to be probably infected.
detected
Objects not disinfected Number of objects which Kaspersky Anti-Virus did not disinfect for the following reasons:
the type of detected object cannot be disinfected;
an error occurred during disinfection.
Objects not moved to The number of objects that Kaspersky Anti-Virus attempted to quarantine but was unable
Quarantine to do so, for example, due to insufficient disk space.
Objects not deleted The number of objects that Kaspersky Anti-Virus attempted but was unable to delete,
because, for example, access to the object was blocked by another application.
Objects not scanned The number of objects in the protection scope that Kaspersky Anti-Virus failed to scan
because, for example, access to the object was blocked by another application.
Objects not backed up The number of objects the copies of which Kaspersky Anti-Virus attempted to save in
Backup but was unable to do so, for example, due to insufficient disk space.
Processing errors Number of objects whose processing resulted in an error.
Objects disinfected Number of objects disinfected by Kaspersky Anti-Virus.
Moved to Quarantine Number of objects quarantined by Kaspersky Anti-Virus.
Moved to Backup The number of object copies that Kaspersky Anti-Virus saved to Backup.
Objects deleted Number of objects deleted by Kaspersky Anti-Virus.
Password-protected Number of objects (archives, for example) that Kaspersky Anti-Virus missed because they
objects were password protected.
Corrupted objects The number of objects skipped by Kaspersky Anti-Virus as their format was corrupted.
Objects processed Total number of objects processed by Kaspersky Anti-Virus.
67
TRUSTED ZONE
This section provides information about the trusted zone of Kaspersky Anti-Virus, as well as instructions on how to add
objects to the trusted zone when executing Kaspersky Anti-Virus tasks.
IN THIS SECTION
About Kaspersky Anti-Virus trusted zone ........................................................................................................................ 68
Adding exclusions to the trusted zone ............................................................................................................................. 69
About importing and exporting settings ........................................................................................................................... 71
Enabling and disabling the use of the trusted zone in Kaspersky Anti-Virus tasks.......................................................... 72
Trusted processes
Exclusions of this type are applied in tasks of real-time protection of files and network storage protection over RPC.
Some applications on the server may be instable if the files that they access are intercepted by Kaspersky Anti -Virus.
Such applications include, for example, system domain controller applications.
In order to avoid disrupting the operation of such applications, you can disable real-time protection of files accessed by
the operating processes of these applications (thereby creating a list of trusted processes within the trusted zone).
Microsoft Corporation recommends excluding some Microsoft Windows operating system files and Microsoft application
files from real-time file protection as programs that cannot be infected. The names of some of these are listed on the
Microsoft website http://www.microsoft.com/en/ (article code: KB822158).
You can enable or disable the use of trusted processes in the trusted zone.
If the executable process file is modified, for example, if it is updated, Kaspersky Anti-Virus will exclude it from the list of
trusted processes.
68
TRUST ED ZONE
Backup operations
Exclusions of this type are used in Real-time protection of files tasks.
For the duration of Backup copying, you can disable real-time protection of objects that are accessed during Backup
copying operations. Kaspersky Anti-Virus will scan objects which the backup copying application opens for reading with
the FILE_FLAG_BACKUP_SEMANTICS attribute.
Exclusion rules
Exclusions of this type are applied in the Real-time protection of files, Real-time protection of network storage systems,
Script scanning tasks and in on-demand scan tasks.
You can use the list of exclusions in the trusted zone for the Real-time protection of files, Real-time protection of network
storage systems, and Script scanning tasks, as well as for on-demand scan tasks. You can select tasks for which you
want to use every exclusion rule that has been added to the trusted zone. Also, you can exclude objects from scans in
the security level settings of every single Kaspersky Anti-Virus task.
You can add objects to the trusted zone by their location on the server, by name or name mask of the object detected in
those objects, or use both criteria.
Based on an exclusion rule, Kaspersky Anti-Virus can skip objects while performing the specified tasks according to the
following settings:
Specified objects detected by name or name mask in the specified areas of the server or the network storage
system
All objects detected in the specified areas of the server or the network storage system
Specified detectable objects by name or name mask within the entire protection / scan scope.
IN THIS SECTION
Adding processes to the list of trusted processes ........................................................................................................... 69
Disabling the use of a trusted process in the trusted zone .............................................................................................. 70
Disabling the features of real-time file protection and real-time protection of network storage systems during backup.
Exclusions of the trusted zone......................................................................................................................................... 71
Adding an exclusion rule to the trusted zone ................................................................................................................... 71
If the executable file of a process has been modified, Kaspersky Anti-Virus excludes this process from the list of
trusted processes.
69
ADM INISTRA TOR' S G UIDE
It is required that the account under which the Real-time protection of files task is run has the
administrator rights on the server with Kaspersky Anti-Virus installed in order to allow viewing the list of
active processes. You can sort processes in the list of active processes by file name, PID, or path to
the executable file of the process on the local computer.
Kaspersky Anti-Virus does not consider a process to be trusted if the path to the executable file of that
process differs from the path that you have specified in the Folder containing file on protected
computer field.
70
TRUST ED ZONE
If you want to specify the name of an object to detect, select the Objects to detect check box, click the
Modify button, and, in the List of objects to detect window, specify the name or name mask of the object
to detect according to the Virus Encyclopedia classification (http://www.securelist.com/en/), such as not-
a-virus:RemoteAdmin*.
In the Rule scope section, select the check boxes next to the names of task to which the exclusion should
be applied.
4. Click OK to save changes and close the window.
The exclusion rule that you have added will be displayed in the list on the Exclusion rules tab of the Trusted
zone window.
71
ADM INISTRA TOR' S G UIDE
On-demand scan.
Updating Kaspersky Anti-Virus databases and application modules.
Quarantine.
Backup.
Logs
Administrator and user notifications
Trusted zone.
Also, you can save the general settings of Kaspersky Anti-Virus in the file, as well as the rights of user accounts.
Kaspersky Anti-Virus does not export group task settings.
Kaspersky Anti-Virus exports all passwords used in the application, for example data for the accounts used to launch
tasks or to connect to the proxy server, and saves them in the configuration file in an encrypted format. However, these
can be imported only by the Kaspersky Anti-Virus installed on the same computer if it has not been re-installed or
upgraded. Kaspersky Anti-Virus installed on another computer cannot import them. After settings have been imported to
another computer passwords must be entered manually.
If a Kaspersky Security Center policy is active at the moment of export, Kaspersky Anti-Virus exports the values used by
that policy.
Settings from a configuration file containing parameters for individual components of Kaspersky Anti-Virus (e.g., from a
file created in Kaspersky Anti-Virus installed with incomplete set of components) can be imported. After such a
configuration is imported, only those Kaspersky Anti-Virus settings that were present in the configuration file will change.
Other settings will remain unchanged.
Imported task settings are not used in tasks running; they will be applied upon the next task start.
Settings of an active policy of Kaspersky Security Center that have been blocked do not change when importi ng the
settings.
72
ISOLATING PROBABLY INFECTED
OBJECTS. USING QUARANTINE
This section describes how to isolate probably infected objects by quarantining them and how to configure Quarantine
settings.
IN THIS SECTION
IN THIS SECTION
Sorting Quarantine objects .............................................................................................................................................. 73
Filtering Quarantine objects ............................................................................................................................................ 74
73
ADM INISTRA TOR' S G UIDE
74
ISOLAT IN G P ROB ABLY INF ECTED OB JEC TS. US IN G Q UARA NT INE
To avoid scanning large-sized objects by Kaspersky Anti-Virus when restoring files from Quarantine, set an exclusion for
the folder %Temp%\wseeqbfiles\.
The Restore to folder is used for storing restored objects on the protected server. You can configure special security
settings for it to be scanned. The path to this folder is set by the Quarantine settings.
75
ADM INISTRA TOR' S G UIDE
You can restore the object and save its copy in the quarantine folder to use it later, for example in order to rescan the
object after the database has been updated.
If a quarantined object was contained in a composite object (for example in an archive), Kaspersky Anti-Virus will not
include into this composite object during the restoration, rather it will save separately into a selected folder.
76
ISOLAT IN G P ROB ABLY INF ECTED OB JEC TS. US IN G Q UARA NT INE
QUARANTINING OBJECTS
You can quarantine files manually.
To quarantine a file, perform the following steps:
1. Right-click the Quarantine node in the console tree and select Add object.
2. In the Open window, select the file on the disk that you wish to quarantine and click the OK button.
Kaspersky Anti-Virus will quarantine the selected file.
Quarantined object cannot be sent for analysis to Kaspersky Lab after the license expires.
To send a file for analysis to Kaspersky Lab, take the following steps:
1. If the file was not quarantined, first move it into Quarantine (see page 77).
2. In the Quarantine node, open the context menu on the file which you wish to send for analysis and select Send
object for analysis in the context menu.
3. If a mail client is configured on the computer on which Kaspersky Anti-Virus Console is installed, a new email
message will be created. Review it and click the Send button.
The Receiver field will contain the Kaspersky Lab email address [email protected]. The Subject field
will contain the text "Quarantined object".
The body of the message will contain the following text: "This file will be sent to Kaspersky Lab for analysis".
You can include any additional information about the file in the message body: why you considered it to be
probably infected or dangerous, how it behaves, or how it impacts the system.
77
ADM INISTRA TOR' S G UIDE
Archive <object name>.cab will be attached to the message. This archive will contain file <uuid>.klq with the
object in encrypted form, file <uuid>.txt with information about the object collected by Kaspersky Anti-Virus, as
well as the file Sysinfo.txt, which contains the following information about Kaspersky Anti-Virus and the
operation system installed on the server:
name and version of the operating system;
Kaspersky Anti-Virus name and version;
release date of the latest database update installed;
Active key number.
This information is required by Kaspersky Lab's anti-virus analysts in order analyze your file faster and more
efficiently. If, however, you do not wish to transfer this information you can delete Sysinfo.txt file from the
archive.
If no mail client applications are configured on the computer on which the Kaspersky Anti-Virus Console is
installed, the Microsoft Windows Internet connection setup wizard will open. You can perform the following
operations:
follow the Internet connection setup wizard instructions to create a new account and send the file from this
computer.
close the wizard and save the selected encrypted object to a file. This file can be sent to Kaspersky Lab
manually.
To save an encrypted object to a file, take the following steps:
1. In the window that opens with a prompt to save the object click the Yes button.
2. Select a folder on the drive of the protected server or a network folder where the file containing the object
will be saved.
QUARANTINE STATISTICS
You can view information about the number of quarantined objects - quarantine statistics.
In order to view quarantine statistics,
open the context menu on the Quarantine node in the console tree and select Statistics.
78
ISOLAT IN G P ROB ABLY INF ECTED OB JEC TS. US IN G Q UARA NT INE
The Statistics window displays information about the number of objects currently stored in Quarantine (see the
following table):
Table 20. Information about quarantined objects in the Statistics window
FIELD DESCRIPTION
Probably infected objects Number of objects found by Kaspersky Anti-Virus to be probably infected.
Current Quarantine size Total size of data in the quarantine folder.
False alarms The number of objects that received False alarm status because they were classified
as non-infected during the quarantine scan using updated databases.
Objects disinfected The number of objects that received Disinfected status after the quarantine scan.
Total number of objects Total number of objects in Quarantine.
79
BACKUP COPYING OF OBJECTS BEFORE
DISINFECTION / DELETION. USING BACKUP
This section provides information about backup of detected malicious objects before disinfection or deletion, as well as
about how to configure Backup.
IN THIS SECTION
Large objects placed in Backup can slow down the system and reduce disc space on the hard drive.
Files can be restored from Backup either to their original folder or to a different folder on the protected server or on
another computer in the local area network. A file can be restored from Backup, for example, if an infected file contained
important information, but during the disinfection of this file Kaspersky Anti-Virus was unable to maintain its integrity and
therefore the information became unavailable.
80
BAC KUP CO PY ING O F OBJEC TS B EF ORE D IS INFE CT ION / DELETION. U SIN G BAC KUP
IN THIS SECTION
Sorting files in Backup ..................................................................................................................................................... 81
Filtering files in Backup ................................................................................................................................................... 81
81
ADM INISTRA TOR' S G UIDE
When restoring a file, you can choose the location where to save it: to the original folder (by default), to a special folder
for restored objects on the protected server, to a custom folder on a computer where Kaspersky Anti-Virus Console is
installed, or to another computer in the network.
In Administration Console, to restore a file from Backup without scanning this file at the moment of saving it to the folder
specified, the Administrator should previously create an exclusion rule for the folder %Temp%\wseeqbfiles\.
The Restore to folder is used for storing restored objects on the protected server. You can configure special security
settings for it to be scanned. The path to this folder is set by the Backup settings. See section "Configuring backup
settings" (see page 83).
By default when Kaspersky Anti-Virus is restoring a file it makes a copy of it in Backup. The file copy can be deleted from
Backup after it is restored.
To restore files from Backup, take the following steps:
1. Select the Backup node in the console tree.
2. Perform one of the following steps:
in order to restore one file, open the context menu on the file you wish to restore in the list of files in Backup
and select the Restore command.
to restore multiple files, select the files you wish to restore in the list using the Ctrl or Shift key, open the
context menu on the one of the selected files and select the Restore command.
3. In the Restore object window, specify the folder to which the restored file will be saved.
The name of the file is displayed in the Object field in the upper part of the window. If multiple files are selected,
this field will contain the name of the file displayed first in the list.
Perform one of the following steps:
To save the file being restored on the protected server, select one of the following options:
Restore to the source folder, if you do not want to restore the file to its original folder.
Restore to the default server folder for restoration, if you wish to restore the file to the folder
specified as the folder for restored objects in the Backup settings.
To save the restored file to a different folder select Restore to folder on your local computer or on
network resource and select the required folder (on the computer where Kaspersky Anti-Virus Console is
installed or network folder), or specify the path to it.
4. If you wish to save a copy of the file in the Backup folder after it is restored, clear the Delete objects from
storage after they are restored check box.
5. If several files are selected to be restored, then in order to apply the selected saving conditions to the rest of the
selected objects, check the box Apply to all selected objects.
All selected files are restored and saved in the specified folder: if you have selected Restore to the source
folder on the server, each of the files will be saved to its original location; if you have selected Restore to the
default server folder for restoration or Restore to folder on your local computer or on network resource,
all objects will then be saved into the folder that you have specified.
6. Click OK.
Kaspersky Anti-Virus will start restoring the first of the selected files.
If a file with this name already exists in the specified location, the Object with this name already exists
window opens.
82
BAC KUP CO PY ING O F OBJEC TS B EF ORE D IS INFE CT ION / DELETION. U SIN G BAC KUP
83
ADM INISTRA TOR' S G UIDE
BACKUP STATISTICS
You can view information about the current status of Backup: Backup statistics.
To view Backup statistics,
open the context menu on the Backup node in the console tree and select Statistics. The Backup statistics
window opens.
The Backup statistics window displays information about the current Backup status (see table below).
Table 21. Information about current Backup status
FIELD DESCRIPTION
Current Backup size Data size in the Backup folder; application calculates the file size in encrypted form.
Total number of objects Current total number of objects in Backup
84
EVENT REGISTRATION. KASPERSKY ANTI-
VIRUS LOGS
This section provides information about how to manage Kaspersky Anti-Virus logs: system audit log, Kaspersky Anti-
Virus task log, and Kaspersky Anti-Virus event log.
IN THIS SECTION
Kaspersky Anti-Virus records information to trace files and memory dump files in non-encrypted format.
85
ADM INISTRA TOR' S G UIDE
IN THIS SECTION
Sorting events in the system audit log ............................................................................................................................. 86
Filtering events in the system audit log ........................................................................................................................... 86
Deleting events from system audit log............................................................................................................................. 87
86
EVENT RE G ISTR ATION . K ASPE RSKY ANT I- VIRU S LOGS
TASKS LOGS
This section provides information about tasks logs of Kaspersky Anti-Virus and instructions on how to manage them.
IN THIS SECTION
About tasks logs .............................................................................................................................................................. 87
Viewing the list of events in tasks logs ............................................................................................................................ 87
Sorting events in task logs .............................................................................................................................................. 88
Filtering events in task logs ............................................................................................................................................. 88
Viewing statistics and information about a Kaspersky Anti-Virus task in task logs .......................................................... 88
Exporting information from a task log .............................................................................................................................. 89
Deleting events from task logs ........................................................................................................................................ 89
87
ADM INISTRA TOR' S G UIDE
88
EVENT RE G ISTR ATION . K ASPE RSKY ANT I- VIRU S LOGS
Open the context menu of the event that has occurred in the task for which you want to view the log, and
select View log.
4. In the window that opens, the following details are displayed:
The Statistics tab displays the time of the task startup and completion, as well as the task statistics.
The Events tab displays a list of events that have been logged during the task run.
The Properties tab displays the task settings.
5. If necessary, click the Filter button to filter the events in the task log.
6. If necessary, click the Export button to export data from the task log into a file in CSV or TXT format.
7. Click the Close button to close the Logs window.
Events from logs of tasks that are currently running and tasks being used by other users will not be deleted.
89
ADM INISTRA TOR' S G UIDE
90
EVENT RE G ISTR ATION . K ASPE RSKY ANT I- VIRU S LOGS
For the Real-time protection of files, RPC: Network storage protection, ICAP: Network storage
protection, Script scanning, On-demand scan, and Update components, events are set to be
recorded in the task completion log and the event log. For these components, the table of event list
contains the Logs and Event Log columns. Events for the Quarantine and Backup components are
registered with the system audit log and the event log. For these components, the table of event list
contains the Audit and Event Log columns.
In the Severity level list, select a detail level for events in tasks logs, the system audit log, and the
event log for the selected component.
In the following table with a list of events, the check boxes are selected next to events that are
registered with task logs, the system audit log, and the event log, according to the current detail level.
If you want to manually enable registration of specific events for a selected component, perform the
following actions:
a. In the Importance level list, select Custom.
b. In the table with the list of events, select the check boxes next to events that you want to be
registered in task logs, the system audit log, and the event log.
On the Advanced tab, if necessary, select a folder in which Kaspersky Anti-Virus should save log files, and
specify the time period for the storage of events in task logs and the system audit log:
Logs folder.
Path to the log folder in UNC (Universal Naming Convention) format.
Default path: C:\ProgramData\Kaspersky Lab\KAV for Windows Servers Enterprise Edition\8.0\Reports\.
91
MANAGING KASPERSKY ANTI-VIRUS KEYS
This section describes how to add a key to the application, delete a key, and view information about keys that have bee n
added.
IN THIS SECTION
Adding a key ................................................................................................................................................................... 92
Deleting a key.................................................................................................................................................................. 92
Viewing the details of added keys ................................................................................................................................... 93
ADDING A KEY
You can add a key by applying a key file.
If an active key has already been added for Kaspersky Anti-Virus and you add another key as the active key, the new
key replaces the key added previously. The key installed earlier is removed.
If an additional key has already been added for Kaspersky Anti-Virus and you add another key as the additional key, the
new key replaces the previously added key. The supplementary key installed earlier is removed.
If an active key and an additional key have already been added for Kaspersky Anti-Virus and you add a new key as the
active key, the new key replaces the active key added previously and the additional key is deleted.
To add a key, perform the following steps:
1. Open the context menu of the Licensing node in the console tree and select Add key.
2. Specify the key file in the Add key window that opens.
3. To add an additional key, select the Use as additional key check box.
4. Click OK.
SEE ALSO
Deleting a key.................................................................................................................................................................. 92
Viewing the details of added keys ................................................................................................................................... 93
If you delete an added key, you can restore it only by re-applying the key file.
92
MANAG IN G K ASPER SKY ANT I- VIRU S KEYS
The following information is displayed in the results panel for the key (see table below).
Table 22. Information about the license
FIELD DESCRIPTION
In the Properties: <Key> window on the General tab shows detailed information about the key (see table below).
Table 23. Detailed license information
FIELD DESCRIPTION
In the Properties: <Key> window, on the Advanced tab, information about the customer is displayed, as well as contact
information of Kaspersky Lab or the retailer from which you purchased Kaspersky Anti-Virus.
93
NOTIFICATION SETTINGS
This section provides information about ways in which users and administrators of Kaspersky Anti-Virus can be notified
about application events and the server protection status, as well as instructions on how to configure notifications.
IN THIS SECTION
Administrator and user notification methods ................................................................................................................... 94
Configuring administrator and user notifications.............................................................................................................. 94
The NET SEND command sends a notification of an infected object only if the user works on a remote computer running
on Microsoft Windows Server 2003 or earlier, or on Microsoft Windows XP. If it is located on the protected server, the
NETSEND command does not send any notifications of infected objects.
In Kaspersky Anti-Virus Console, administrator or user notifications can be activated using several methods:
User notification methods:
a. Terminal service tools.
You can apply this method for notifying terminal users if the protected server is used as terminal.
b. Message service tools.
You can apply this method for notification via Microsoft Windows message services. This method is not
used if the protected server is running on Microsoft Windows Server 2008.
Administrator notification methods:
a. Message service tools.
You can apply this method for notification via Microsoft Windows message services. This method is not
used if the protected server is running on Microsoft Windows Server 2008.
b. Running an executable file.
This method runs an executable file stored on the local drive of the protected server, when the event
occurs.
c. Sending by email.
This method uses email to transmit messages.
You can create a message text for individual event types. It can include an information field to describe an event. By
default, the application uses a predefined text to notify users.
94
NOTIF ICAT IO N S ETT ING S
You can create the same message text for several types of events: after you have selected a notification
method for one event type, select the other event types for which you want to use the same message text, by
using the Ctrl or Shift key, and then click the Message text button.
To add fields with information about an event, click the Macro button and select the relevant fields from the
dropdown list. Fields with event information are described in the table in this section.
In order to restore the default text of the message for this event, click the By default button.
4. To configure the selected methods of administrator notification of selected events, click the Settings button in
the Notifications window and configure the selected methods in the Advanced settings window. To do so:
a. For email notifications, open the Email tab and specify the email addresses of recipients (delimit addresses
with semicolon), name or network address of SMTP server, and port number in the appropriate fields. If
necessary, specify the text that will be displayed in the Subject and From fields. The text in the Subject
field can also include a field with information about the event (see table below).
If you wish to use user account authentication when connecting to the SMTP server, select Use SMTP
authentication in the Authentication settings group and specify the name and password of the user
whose user account will be authenticated.
b. To send notifications via the messaging service on the Messaging Service tab, compile a list of notification
recipient computers: for each computer that you want to add, click the Add button and type its network
name in the entry field.
Note that Messaging Service notifications are not used to deliver notifications if the protected server is
running Microsoft Windows Server 2008 and subsequent versions of Microsoft Windows Server.
c. To run an executable file, select the file on a local drive of the protected server that will be executed on the
server triggered by the event or enter the full path to it on the Executable file tab. Enter the username and
password which will be used to execute the file.
System environment variables can be used when the path to the executable file is specified; user
environment variables are not allowed.
If you wish to limit the number of messages for one event type over a period of time, on the Advanced tab
select Do not send the same notification more than and specify the number of times and time unit.
5. Click OK.
Table 24. Fields with event information
FIELD DESCRIPTION
95
ADM INISTRA TOR' S G UIDE
FIELD DESCRIPTION
%OBJECT% Object name (in real-time protection and on-demand scan tasks).
The Update of application software modules task includes the name of the update
and the address of the web page with information on the update.
%VIRUS_NAME% The name of object according to the Virus Encyclopedia classification
(http://www.securelist.com/en/). This name is included in the full name of the detected
object that Kaspersky Anti-Virus returns on detecting an object. You can view the full
name of the detected object in the task log (see the section "Viewing statistics and
information of a Kaspersky Anti-Virus task using tasks logs" on page 88).
%VIRUS_TYPE% The type of detected object according to the Kaspersky Lab classification, such as
"virus" or "trojan". It is included in the full name of the detected object, which is returned
by Kaspersky Anti-Virus when it finds an object to be infected or probably infected. You
can view the full name of the detected object in the task log (see the section "Viewing
statistics and information of a Kaspersky Anti-Virus task using tasks logs" on page 88).
%USER_COMPUTER% In the Real-time protection of files and RPC: Network storage protection tasks, the
name of the user's computer that has accessed the object on the server.
%USER_NAME% In the Real-time protection of files and RPC: Network storage protection tasks, the
name of the user that has accessed the object on the server.
%FROM_COMPUTER% Name of the protected server where the notification originated.
%EVENT_REASON% Reason event occurred (some events do not have this field).
%ERROR_CODE% Error code (used only for the "internal task error" event).
%TASK_NAME% Task name (only for events related to task performance).
96
HIERARCHICAL STORAGE MANAGEMENT
This section provides information about how to perform anti-virus scans of files located in hierarchical storage areas and
backup systems.
IN THIS SECTION
About tiered storage ........................................................................................................................................................ 97
Configuring HSM system settings ................................................................................................................................... 97
To configure access to the tiered storage, you have to specify the way the HSM system determines the location of the file
being scanned. You can find this information in manuals of the HSM system being used.
To define the access type for hierarchical storage, perform the following steps:
1. Open the HSM system settings window in one of the following ways:
in the console tree, open the context menu of the Kaspersky Anti-Virus node and select the Hierarchical
storage item;
in the console tree, select the Kaspersky Anti-Virus node, and on the quick access panel open the
window by clicking the Hierarchical storage link.
97
ADM INISTRA TOR' S G UIDE
2. Specify the settings of the HSM system on the Hierarchical storage tab:
Non-HSM system.
HSM system uses reparse points.
HSM system uses extended file attributes.
Unknown HSM system.
If you specify the wrong version or select the Unknown HSM system option, Kaspersky Anti-Virus can
incorrectly determine the location of objects, which will increase the time it takes to process objects.
98
IMPORTING AND EXPORTING SETTINGS
This section provides information about how to export the settings of Kaspersky Anti-Virus or the settings of specific
application components to a configuration file in XML format, and how to import those settings from that configuration file
to the application.
IN THIS SECTION
Exporting settings ............................................................................................................................................................ 99
Importing settings ............................................................................................................................................................ 99
EXPORTING SETTINGS
To export settings to a configuration file, take the following steps:
1. If you have modified settings in Kaspersky Anti-Virus Console, save the new values before exporting the
settings.
2. Perform one of the following steps:
To export all of the settings of Kaspersky Anti-Virus, open the context menu of the Anti-Virus node in the
console tree and select Export settings
To export the settings of an individual component, open the context menu of the node of that component in
the console tree and select Export settings
To export the settings of the Trusted Zone component:
a. Open the context menu of the Kaspersky Anti-Virus node in the tree of Kaspersky Anti-Virus Console
and select Configure trusted zone settings.
The Trusted zone window opens.
b. Click the Export button.
The welcome window of the settings export wizard will open.
3. Follow the instructions in the Wizard windows: specify the configuration file name for saving settings and the
path to it.
System environment variables can be used when specifying the path; user environment variables are not
allowed.
If a policy of Kaspersky Security Center is active at the moment of export, Kaspersky Anti-Virus exports the
settings' values used by that policy.
4. Press the OK button in the Export of application settings complete window in order to close the Export
Settings Wizard.
IMPORTING SETTINGS
To import settings from a saved configuration file, take the following steps:
1. Perform one of the following steps:
To import all of the settings of Kaspersky Anti-Virus, open the context menu of the Kaspersky Anti-Virus
node in the console tree and select Import settings
To import the settings of an individual component, open the context menu of the node of that component in
the console tree and select Import settings
99
ADM INISTRA TOR' S G UIDE
After you have imported the general settings of Kaspersky Anti-Virus or its functional components on the server,
you will not be able return to the previous setting values.
3. In the Application settings import completed window, click the OK button to close the Settings Import
Wizard.
4. Press the Refresh button in the toolbar of the Kaspersky Anti-Virus Console to display the imported settings.
Kaspersky Anti-Virus does not import passwords (data of the accounts used to launch tasks or to connect to the
proxy server) from the file created on another computer or on the same computer after the Kaspersky Anti -Virus
installed on it has been re-installed or updated. After the importing operation is completed, passwords must be
entered manually.
100
MANAGING KASPERSKY ANTI-VIRUS FROM
THE COMMAND LINE
This section provides information and instructions on how to manage Kaspersky Anti-Virus at the command prompt.
IN THIS SECTION
Kaspersky Anti-Virus command line commands ........................................................................................................... 101
Return codes ................................................................................................................................................................. 113
COMMAND DESCRIPTION
KAVSHELL HELP (see page 102) Displays Kaspersky Anti-Virus command help.
KAVSHELL START (see page 102) Starts Kaspersky Anti-Virus service.
KAVSHELL STOP (see page 102) Stops Kaspersky Anti-Virus service.
KAVSHELL SCAN (see page 102) Creates and launches a temporary on-demand scan task with the scan
scope and security settings set by the command modifiers.
KAVSHELL SCANCRITICAL (see page 105) Starts the Scan of critical areas system task.
KAVSHELL TASK (see page 106) Starts / pauses / resumes / stops the selected task asynchronously /
returns the current task status / statistics.
KAVSHELL RTP (see page 107) Starts or stops all real-time protection tasks.
KAVSHELL UPDATE (see page 107) Starts Kaspersky Anti-Virus bases update task with the settings specified
using command modifiers.
KAVSHELL ROLLBACK (see page 109) Rolls back bases to the previous version.
101
ADM INISTRA TOR' S G UIDE
COMMAND DESCRIPTION
KAVSHELL IMPORT (see page 112) Imports general Kaspersky Anti-Virus settings, functions, and tasks from a
configuration file created beforehand.
KAVSHELL EXPORT (see page 113) Exports all Kaspersky Anti-Virus settings and existing tasks to a
configuration file.
By default when Kaspersky Anti-Virus is started, tasks Real-time protection of files, Script scanning and Scan at
system startup as well as other tasks that are scheduled to start At application startup will be launched.
102
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
KEY DESCRIPTION
103
ADM INISTRA TOR' S G UIDE
KEY DESCRIPTION
/FE Scan objects by extension. Kaspersky Anti-Virus scans only objects with extensions
included into the list of extensions of infectable objects.
/NEWONLY Scan only new and modified files.
If you do not provide this modifier, Kaspersky Anti-Virus will scan all objects.
/AI: Actions to perform on infected objects. If you do not specify values for this modifier, Kaspersky Anti-Virus will
perform the Skip action.
DISINFECT Skip, delete if disinfection is not possible
DISINFDEL Disinfect, delete if disinfection is impossible
DELETE Delete
The settings DISINFECT and DELETE are saved in the current version of Kaspersky
Anti-Virus in order to ensure compatibility with previous versions. These settings can be
used instead of the key commands /AI: and /AS:. In this case, Kaspersky Anti-Virus will
not process probably infected objects.
REPORT Send report (by default)
AUTO Perform the recommended action
/AS: Action to perform on probably infected objects (actions). If you do not specify values for this modifier,
Kaspersky Anti-Virus will perform the Skip action.
QUARANTINE Quarantine
DELETE Delete
REPORT Send report (by default)
AUTO Perform the recommended action
Exclusions
/E:ABMSPO Excludes composite objects of the following types:
A – archives (scan SFX archives only);
B – email databases;
M – plain mail;
S – archives and SFX-archives;
P – packed objects;
O – embedded OLE objects.
/EM:<"masks"> Exclude files by mask.
You can specify several masks, for example: EM:”*.txt;*.png; C\Videos\*.avi”.
/ET:<number of seconds> Stop processing object if it continues longer than the number of seconds specified by
value <number of seconds>.
There is no time restriction by default.
/ES:<size> Do not scan compound objects larger than the size (in MB) specified by value <size>.
Kaspersky Anti-Virus scans all sizes of objects by default.
/TZOFF Disable Trusted Zone exclusions.
/AI: Action to be performed on offline files: (HSM options)
/SKIP Skip offline files.
/RESIDENT Scan resident file part only.
/SCAN Scan all offline files.
SCAN=<days> Scan only offline files which were accessed during a designated period (day(s)).
/SCAN NORECALL Scan all offline files, where possible not copying them to the hard drive.
104
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AND L IN E
KEY DESCRIPTION
SCAN=<days> Scan only offline files which were accessed during a designated period (day(s)), where
possible not copying them to the hard drive.
Advanced settings (Options)
/NOICHECKER Disable the use of iChecker (enabled by default)
/NOISWIFT Disable the use of iSwift (enabled by default)
/ANALYZERLEVEL:<analysis Enable Heuristic Analyzer, configure analysis level.
intensity> The following levels of heuristic analysis intensity are available:
1 – light;
2 – medium;
3 – deep.
If you omit the modifier, Kaspersky Anti-Virus will not use heuristic analyzer.
/NOCHECKMSSIGN Do not scan files with a digital signature from Microsoft (enabled by default).
/ALIAS:<task alias> Enables you to assign an on-demand scan task a temporary name by which the task can
be accessed during its execution, for example in order to view its statistics using TASK
command. The task alias must be unique among the task aliases of all functional
components of Kaspersky Anti-Virus.
If this modifier is not specified, temporary name scan_<kavshell_pid> is used, for
example scan_1234. The task name is also assigned automatically as Scan objects
(<date and time>) for example Scan objects 8/16/2007 5:13:14 PM.
Settings of task logs (Report settings)
/W:<path to task execution If this key is specified, Kaspersky Anti-Virus will save the task log file with the name
log file> defined by the key's value.
The log file contains task execution statistics, the time when it was started and
completed (stopped), and information about events in this task.
The log is used to register events defined by the settings of task logs and the Kaspersky
Anti-Virus event log in the "Event Viewer".
Either the absolute or relative path to the log file can be specified. If you specify only the
name of a file without specifying the respective path, the log file will be created in the
current folder.
Restarting the command with the same log settings will overwrite the existing log file.
The log file can be viewed while a task is running.
The log appears in the Task logs node of Kaspersky Anti-Virus Console.
If Kaspersky Anti-Virus fails to create the log file, it will not stop the command from
executing but it will display an error message.
/ANSI The option enables recording of events to task log in the ANSI encoding.
The ANSI option will not be applied, if the W option is not defined.
If the ANSI option is not specified, task log is generated using the UNICODE encoding.
Return codes for the KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands (on page 114)
105
ADM INISTRA TOR' S G UIDE
KEY DESCRIPTION
/W:<path to task If this key is specified, Kaspersky Anti-Virus will save the task log file with the name defined by
execution log file> the key's value.
The log file contains task execution statistics, the time when it was started and completed
(stopped), and information about events in this task.
The log is used to register events defined in the task execution log settings and in the Anti-Virus
event log settings in the "Event Viewer".
Either the absolute or relative path to the log file can be specified. If you specify only the name of
a file without specifying the respective path, the log file will be created in the current folder.
Restarting the command with the same log settings will overwrite the existing log file.
The log file can be viewed while a task is running.
The log appears in the Task logs node of Kaspersky Anti-Virus Console.
If Kaspersky Anti-Virus fails to create the log file, it will not stop the command from executing but
it will display an error message.
Return codes for the KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands (on page 114)
KEY DESCRIPTION
Without keys Returns the list of all existing Kaspersky Anti-Virus tasks. The list contains the following fields: task
name, task category (system, user-defined or group) and current task status.
<task alias> Instead of the task name, in the SCAN TASK command, use its Task alias, an additional short-form
name that Kaspersky Anti-Virus assigns to tasks. To view Kaspersky Anti-Virus task aliases enter the
command KAVSHELL TASK without any modifiers.
/START Starts the specified task in asynchronous mode
106
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
KEY DESCRIPTION
Return codes for the KAVSHELL TASK command (on page 115)
KEY DESCRIPTION
107
ADM INISTRA TOR' S G UIDE
KEY DESCRIPTION
Updates sources (mandatory key). Specify one or multiple sources. Kaspersky Anti-Virus will access the sources in the
order in which they are listed. Delimit sources with a space.
<path in UNC format> User-defined updates source. Path to network update folder in the UNC format.
<URL> User-defined updates source. HTTP server address where update folder is located.
<Local folder> User-defined updates source. Folder on the protected server.
/AK Kaspersky Security Center Administration server as the updates source.
/KL Kaspersky Lab's update servers as the updates sources.
/NOUSEKL Do not use Kaspersky Lab's update servers if other updates sources are not available
(used by default).
Proxy server settings
/PROXY:<address>:<port> Network name or IP address of the proxy server and its port. If this key is not specified,
Kaspersky Anti-Virus will automatically detect the settings of the proxy server used in the
local area network.
/AUTHTYPE:<0-2> This key specifies the authentication method to access proxy server. It can have the
following values:
0 – in-built Microsoft Windows NTLM-authentication; Kaspersky Anti-Virus will
contact the proxy server under the Local system (SYSTEM) account;
1 – in-built Microsoft Windows NTLM-authentication; Kaspersky Anti-Virus will contact the
proxy server under account with login name and password specified by the keys
/PROXYUSER and /PROXYPWD;
2 – authentication by login name and password specified by keys /PROXYUSER and
/PROXYPWD (basic authentication).
If authentication is not required for accessing the proxy server, there is no requirement to
specify a key.
/PROXYUSER:<user Username which will be used for accessing proxy server. If the value of key /AUTHTYPE:0
name> is specified, then /PROXYUSER:<user name> and /PROXYPWD:<password> keys will be
ignored.
/PROXYPWD:<password> Username which will be used for accessing proxy server. If the value of key /AUTHTYPE:0
is specified, then /PROXYUSER:<user name> and /PROXYPWD:<password> keys will be
ignored. If /PROXYUSER key is specified and /PROXYPWD omitted, the password will be
considered blank.
/NOPROXYFORKL Do not use proxy server settings for connecting with Kaspersky Lab's update servers (used
by default)
108
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
KEY DESCRIPTION
/USEPROXYFORCUSTOM Use proxy server settings for connecting to user-defined updates sources (not used by
default).
/USEPROXYFORLOCAL Use proxy server settings for connecting to local updates sources. If not specified, the value
Do not use proxy server settings to connect to the local updates sources will apply.
General FTP and HTTP server settings
/NOFTPPASSIVE If this key is specified, Kaspersky Anti-Virus will use the active FTP server mode to connect
to the protected server. If this key is not specified, Kaspersky Anti-Virus will use the passive
FTP server mode, if possible.
/TIMEOUT:<number of FTP or HTTP server connection timeout. If this key is not specified, Kaspersky Anti-Virus
seconds> uses the default value: 10 s. You can only use integers as the value for this key.
/REG:<iso3166 code> Regional settings. This key is used when receiving updates from Kaspersky Lab's update
servers. Kaspersky Anti-Virus optimizes the update load on the server by selecting the
update server nearest to it.
As the value of this key, specify the letter code of the location country for the protected
server in accordance with ISO 3166-1, for example /REG: gr or /REG:RU. If this key is
omitted or a non-existent country code is specified, Kaspersky Anti-Virus will detect the
location of the protected server based on the regional settings on the computer where Anti-
Virus console is installed (for Microsoft Windows 2003 Server and above – according to the
value of Location variable).
/ALIAS:<task alias> This key will allow you to assign a temporary name to the task, to be used to access the
task during its execution. For example, task statistics can be viewed using the TASK
command. The task alias must be unique among the task aliases of all functional
components of Kaspersky Anti-Virus.
If this key is not specified, update_<kavshell_pid>, for example, update_1234 will be used.
In the Kaspersky Anti-Virus Console the task will be automatically assigned Update-
databases (<date time>), for example, Update-databases 8/16/2007 5:41:02 PM.
/W:<path to task execution If this key is specified, Kaspersky Anti-Virus will save the task log file with the name defined
log file> by the key's value.
The log file contains task execution statistics, the time when it was started and completed
(stopped), and information about events in this task.
The log is used to register events defined by the settings of task logs and the Kaspersky
Anti-Virus event log in the "Event Viewer".
Either the absolute or relative path to the log file can be specified. If only the file name is
specified without its path, then the log file will be created in the current folder.
Restarting the command with the same log settings will overwrite the existing log file.
The log file can be viewed while a task is running.
The log appears in the Task logs node of Kaspersky Anti-Virus Console.
If Kaspersky Anti-Virus fails to create a log file, this will not stop the command from
executing, but an error message will be displayed.
Return codes for the command KAVSHELL UPDATE (see section "Return codes for the command KAVSHELL RTP" on
page 115)
Command syntax:
KAVSHELL ROLLBACK
Return codes for the KAVSHELL ROLLBACK command (on page 116)
109
ADM INISTRA TOR' S G UIDE
KEY DESCRIPTION
Without keys The command returns the following information about added keys:
Key number.
License type (commercial or trial).
Duration of the license associated with the key.
Key status (active or additional). If the value specified is *, the key has been added as an
additional key.
Kaspersky Anti-Virus records information to trace files and memory dump files in non-encrypted format.
110
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AND L INE
KEY DESCRIPTION
While cleaning the file fidbox.dat by means of the KAVSHELL FBRESET command, Kaspersky Anti -Virus does
not pause the protection (unlike in cases of manual deletion of fidbox.dat).
Kaspersky Anti-Virus may increase the server workload after the data is cleared in fidbox.dat. In this case, Anti-
Virus scans all files accessed for the first time after the clearing of fidbox.dat. After the scan, Kaspersky Anti-
Virus adds back to fidbox.dat the information about each scanned object. In the case of new attempts to access
the object, the iSwift technology will prevent rescanning of the file provided it remains unchanged.
111
ADM INISTRA TOR' S G UIDE
If the UAC (User Account Control) feature is enabled in your operating system, you should run the command prompt
under the administrator rights to run the KAVSHELL FBRESET command.
KEY DESCRIPTION
112
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
KEY DESCRIPTION
<name of configuration Name of configuration file used as the import source for settings.
file and path to file> System environment variables can be used when specifying the path to the file; user
environment variables are not allowed.
KEY DESCRIPTION
<name of configuration file Name of configuration file which will contain settings.
and path to file> Any extension can be assigned to the configuration file.
System environment variables can be used when specifying the path to the file; user
environment variables are not allowed.
RETURN CODES
IN THIS SECTION
Return code for the commands KAVSHELL START and KAVSHELL STOP ................................................................ 114
Return code for KAVSHELL SCAN and KAVSHELL SCANCRITICAL commands ....................................................... 114
Return codes for KAVSHELL TASK command ............................................................................................................. 115
Return codes for the KAVSHELL RTP command.......................................................................................................... 115
Return codes for KAVSHELL UPDATE command ........................................................................................................ 115
Return codes for the KAVSHELL ROLLBACK command.............................................................................................. 116
Return codes for the KAVSHELL LICENSE command ................................................................................................. 116
Return codes for the KAVSHELL TRACE command..................................................................................................... 116
Return codes for the KAVSHELL FBRESET command ................................................................................................ 117
Return codes for the KAVSHELL DUMP command ...................................................................................................... 117
Return codes for the KAVSHELL IMPORT command ................................................................................................... 117
Return codes for the KAVSHELL EXPORT command .................................................................................................. 118
113
ADM INISTRA TOR' S G UIDE
DESCRIPTION
114
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
115
ADM INISTRA TOR' S G UIDE
116
MANAG IN G K ASPER SKY ANT I- VIRU S F ROM T HE CO MM AN D L INE
117
ADM INISTRA TOR' S G UIDE
-3 Permissions error
-5 Invalid syntax
-10 Unable to create a configuration file (for example no access to the folder specified in the path to the
file)
-99 Unknown error
501 Operation completed successfully, however an error/comment occurred during the command
execution, for example, Kaspersky Anti-Virus did not export parameters of some functional component
118
MANAGING ANTI-VIRUS USING
KASPERSKY SECURITY CENTER
This section provides information and instructions on how to manage Kaspersky Anti-Virus and configure it through
Kaspersky Security Center Administration Console.
IN THIS SECTION
IN THIS SECTION
Opening the Application settings window ...................................................................................................................... 119
Managing quarantined objects and configuring Quarantine settings ............................................................................. 120
Managing Backup files and configuring Backup settings............................................................................................... 121
Managing the trusted zone ............................................................................................................................................ 123
Configuring Kaspersky Security Center notifications ..................................................................................................... 125
Configuring settings in Kaspersky Security Center........................................................................................................ 127
Configuring log settings using Kaspersky Security Center ............................................................................................ 128
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the ap plication
settings, these settings cannot be edited via the Application settings window.
119
ADM INISTRA TOR' S G UIDE
IN THIS SECTION
Quarantine functions and configuration tools ................................................................................................................ 120
Configuring quarantine settings in Kaspersky Security Center...................................................................................... 121
120
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the
application settings, these settings cannot be edited via the Application settings window.
IN THIS SECTION
Functions of Backup and tools used to control these functions ..................................................................................... 121
Configuring Backup settings in Kaspersky Security Center........................................................................................... 122
121
ADM INISTRA TOR' S G UIDE
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the
application settings, these settings cannot be edited via the Application settings window.
5. In the Properties section, in the Storages settings group click the Settings button.
6. Use the Backup tab of the Storage settings window to configure the following Backup settings, if necessary:
To specify the Backup folder, use the Backup folder field to select the required folder on the local drive of
the protected server, or enter its full path.
To set the maximum size of Backup, select the Maximum Backup size (MB) check box and specify the
relevant value in megabytes in the entry field.
122
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
To set the threshold of free space in Backup, define the value of the Maximum Backup size setting, select
the Threshold of free space check box, and specify the minimum value of free space in the Backup folder
in megabytes.
To specify a folder for restored objects, select the relevant folder on a local drive of the protected server in
the Restoration settings section, or enter the name of the folder and the full path to it in the Target folder
for restoring objects field.
7. Click OK.
IN THIS SECTION
Adding processes to the trusted list (Kaspersky Security Center) ................................................................................. 123
Disabling real-time file protection during backup copying.............................................................................................. 124
Adding exclusions to the trusted zone ........................................................................................................................... 124
Applying the trusted zone in Kaspersky Security Center ............................................................................................... 125
123
ADM INISTRA TOR' S G UIDE
124
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
7. To exclude a detectable object by its name or name mask, select the Detectable objects check box, click the
Edit button, and enter the relevant value in the List of detectable objects window.
Click OK. Perform one of the following steps:
To edit a rule, select the rule you wish to edit on the Exclusion rules tab, click Modify and edit it in the
Exclusion rule window.
To delete the rule, select it on the Exclusion rules tab, click Delete and confirm the operation.
8. Check the boxes next to the names of the functional components to whose tasks the exclusion rule will be
applied.
Click OK in the Configure trusted zone settings window.
9. If required, apply trusted zone exclusions in the selected tasks and policies.
IN THIS SECTION
General information on notification settings in Kaspersky Security Center ................................................................... 126
Configuring administrator and user notifications in the Notification Settings window .................................................... 126
125
ADM INISTRA TOR' S G UIDE
If you configure notifications about events of the same type using the same mode but on the two tabs simultaneously
(both on the Events tab and in the Notification settings window), the system administrator will receive notifications of
those events twice but in the same mode.
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the
application settings, these settings cannot be edited via the Application settings window.
5. In the Logs and notifications section, click the Settings button under Event notifications.
6. In the Notification settings window, configure notifications about the events of required types and click the OK
button.
Configuring notifications in the Notification settings window is similar to configuring notifications in the
Notifications window of the Kaspersky Anti-Virus Console.
7. Click OK to save changes.
126
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the
application settings, these settings cannot be edited via the Application settings window.
5. In the following sections, edit the settings of Kaspersky Anti-Virus according to your requirements.
6. In the Malfunction diagnosis section, edit the following settings for diagnostics of failures:
enable or disable creation of the trace log;
configure the log settings if required;
enable or disable creation of Kaspersky Anti-Virus process memory dump files.
Kaspersky Anti-Virus records information to trace files and memory dump files in non-encrypted format.
7. In the Settings section, click the Settings button in the Scalability and reliability block of settings and define
the following settings of Kaspersky Anti-Virus in the window that opens, according to your requirements:
maximum number of working processes that Kaspersky Anti-Virus can run;
number of processes for real-time protection tasks;
maximum number of working processes for background on-demand scan tasks;
number of task recovery attempts after their abnormal termination.
Click OK.
8. In the Settings section, click the Settings button in the Additional block of settings and define the following
settings of Kaspersky Anti-Virus in the window that opens, according to your requirements:
specify whether you want the Kaspersky Anti-Virus icon to be displayed in the server's taskbar notification
area every time Kaspersky Anti-Virus automatically starts after a server restart. For more details see
section "Kaspersky Anti-Virus icon in notification area of the task" tray (see page 30).
Kaspersky Anti-Virus operations when running on UPS power;
specify the number of days after which the events Database is obsolete, Database is outdated and
Scanning of critical areas has not been performed for a long time will occur.
Click OK.
On the tab Tiered storage choose one of the following options for access to hierarchical storage:
Non-HSM system.
HSM system uses reparse points.
HSM system uses extended file attributes.
Unknown HSM system.
If you do not use HSM systems, leave unchanged the default value of the HSM system settings setting (Non-
HSM system).
9. After you have configured values for the required Kaspersky Anti-Virus settings, click OK in the Application
settings window.
127
ADM INISTRA TOR' S G UIDE
If an application is covered by the Kaspersky Security Center policy and this policy prohibits changing the
application settings, these settings cannot be edited via the Application settings window.
5. In the Logs and notifications section, click the Settings button in the Task logs block of settings.
6. In the Log settings window, define the following settings of Kaspersky Anti-Virus according to your
requirements:
Configure the level of detail of events in logs. To do so:
a. Use the Component list to select Kaspersky Anti-Virus component, for which you are selecting the
level of details.
b. To define level of detail in the task execution logs and system audit log for the selected component,
choose the level you need from Importance level.
To change the default location for logs, specify full path to the folder or click the Browse button to select it.
Specify how many days task execution logs will be stored.
Specify how many days information displayed in the System audit log node will be stored.
7. After you have configured the values of the required Kaspersky Anti-Virus logging settings, click OK.
8. Press the OK button in the Application settings window.
ABOUT POLICIES
Global Kaspersky Security Center policies can be created for managing protection on several servers where Kaspersky
Anti-Virus is installed.
128
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
A policy enforces the Kaspersky Anti-Virus settings, functions and tasks specified in it on all the protected servers for one
administration group.
Several policies for one administration group can be created and enforced in turns. In the Administration Console, the
policy currently active for a group has the active status.
Information on policy enforcement is logged in the Kaspersky Anti-Virus system audit log. This information can be viewed
in the Kaspersky Anti-Virus console in the System audit log node.
Please note that Kaspersky Security Center features only one method for applying policies: Change required settings.
After applying a policy of Kaspersky Security Center, Kaspersky Anti-Virus uses the values for settings next to which you
have selected the icon in the policy properties, instead of the values for those settings that had been actual before the
policy was applied. Kaspersky Anti-Virus will not apply the values for settings next to which the icon has been selected
in the policy properties.
When the policy is active, Kaspersky Anti-Virus Console and the <Application name> settings window of
Administration Console display the values of settings marked with the icon in the policy, but those values cannot be
edited. The rest of the settings (marked with the icon in the policy) can be edited in Kaspersky Anti-Virus Console and
in the <Application name> settings window of Administration Console.
If the policy defines the settings for any real-time protection task and / or the task of real-time protection of network
storage systems and if such a task is currently running, then the settings defined by the policy will be modified as soon
as the policy is applied. If the task is not running, the settings will be enforced when it starts. If the policy defines the
settings for update tasks or on-demand scan tasks, those settings will be modified after the policy is applied but only at
the next startup of the tasks.
129
ADM INISTRA TOR' S G UIDE
7. In the Create a group policy for applications window, select one of the following policy statuses:
Active policy if you want to apply the policy immediately after it is created. If an active policy already exists
in the group, this existing policy will become inactive and the policy you create will be activated.
Inactive policy if you do not want to apply the created policy immediately. In this case the policy may be
activated later.
Offline user policy if you want to create a policy for a managed computer located outside the corporate
network. The offline user policy is available only for Kaspersky Anti-Virus for Workstations (running
Microsoft Windows).
8. Press the Finish button in the Completing the wizard window of the wizard.
The created policy will be displayed in the list of policies in the Policies node of the selected administration
group. In the Properties: <Policy name> window, you can now define other Kaspersky Anti-Virus settings, and
its features and tasks.
130
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
If the protected server is excluded from the administration group, the system tasks schedule will be enabled
automatically.
To disable the scheduled launch of an Kaspersky Anti-Virus system task on the servers of a group, take the
following steps:
1. In the Managed computers node in the Administration Console tree, expand the required group and select the
Policies tab.
2. On the Policies tab in the context menu of the policy with which you want to disable the scheduled launch of
Kaspersky Anti-Virus system tasks on the group servers, select the Properties command.
3. In the Properties: <Policy name> window, open the System tasks section.
4. Unselect the system tasks whose scheduled launch you wish to disable.
To resume the schedule for system tasks of the required type, check the box next to the names of system tasks
of this type.
5. Click OK.
If the scheduled launch of system tasks is disabled, these can still be run manually, either from the Kaspersky Anti -Virus
Console or from the Kaspersky Security Center Administration Console.
131
ADM INISTRA TOR' S G UIDE
Using policies you can disable schedules for update and on-demand scan local system tasks on all protected servers,
from the same administration group.
General information on tasks in Kaspersky Security Center s provided in Kaspersky Security Center. Administrator's Guide.
132
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
To exclude all scan scopes from the scan, open the context menu on each of the lines and select
Delete scope.
To include a predefined scan scope, disk, folder, network object, or file in the scan scope, right-click
the Scan scope table and select Add scan scope. In the Add objects to the scan scope window,
select a predefined scope in the Predefined scan scope list, specify a server disk, folder, network
object, or file on a server or on another networked computer, and click the OK button.
To exclude subfolders or files from the scan, select an added folder (disk) in the Scan scope window
of the wizard, open the context menu and select Configure, then click the Settings button in the
Security level window, and in the On-demand scan settings window, on the General tab, clear the
Subfolders (Subfiles) check box.
To change scan scope security settings, open the context menu on the scope whose settings you wish
to configure, and select Configure. In the On-demand scan settings window, select one of the
predefined security levels, or click the Settings button to configure security settings manually.
Configuration is performed in the same way as in Kaspersky Anti-Virus Console.
To exclude embedded objects from the scan scope that you have added, open the context menu in the
Scan scope table, select Add exclusion, and specify the objects that you want to exclude: select a
predefined scan scope in the Predefined scan scope list, specify a server disk, folder, network object,
or file on a server or on another networked computer, and click the OK button.
Excluded scan scopes are marked with the icon in the table.
a. Do the following in the Properties window.
Check the Apply trusted zone box, if you wish to exclude objects described in Kaspersky Anti-Virus
trusted zone from the scan scope of the task.
If you plan to use the task created as a scan of critical areas task, select the Task performance is
considered as scanning of critical areas check box in the Properties window. Kaspersky Security
Center evaluates the security rating of the server (servers) by the performance results of tasks with the
Scan critical areas status, and not only by the performance results of the Critical Areas Scan system
task. When creating a local on-demand scan task, this check box is not available.
To assign the base priority Low to the working process in which the task will be executed, select the
Perform task in the background check box in the Properties window. By default, the working
processes in which Kaspersky Anti-Virus tasks are run have the Medium (Normal) priority. Demoting
the process priority increases the time required to execute the task, but it may have a beneficial effect
on the execution speed of the processes of other active programs.
To create an update task, configure task settings based on your requirements:
a. Select updates source in the Update source window.
b. Click the LAN settings button. The Connection settings window opens.
c. On the Connection settings tab, perform the following actions:
Specify the FTP server mode for connecting to the protected server.
Modify the connection timeout when connecting to the update source, if required.
Configure proxy server access settings when connecting to the update source.
Specify protected server(s) location, to optimize update downloads.
To create the Update application modules task, define the relevant settings for the update of application
modules in the Application modules update settings window:
a. Select download and install critical updates for application modules or check for their availability only.
b. If you have selected Copy and install critical updates of application software modules: you may
need to restart the server to apply the application modules that you have installed. If you want
Kaspersky Anti-Virus to restart the server automatically upon the task completion, select the Allow
system reboot check box. To disable automatic server restart upon task completion, clear the Allow
system reboot check box.
c. To obtain information about Kaspersky Anti-Virus module upgrades, select Receive information
about available maintenance updates for application software modules.
Kaspersky Lab does not publish planned update packages on the update servers for automatic
installation; these can be downloaded manually from the Kaspersky Lab website. Administrator
notification about the event Scheduled Kaspersky Anti-Virus updates available can be configured;
this will contain the URL of our site from which planned updates can be downloaded.
133
ADM INISTRA TOR' S G UIDE
To create the Copying updates task, specify the updates set and the destination folder in the Update
copying settings window.
To create the Add key task, specify the key file name (with .key extension) and the full path to it in the Key
file field of the Add key window.
6. Configure the task schedule (you can configure a schedule for all task types except Database update
rollback). take the following actions in the Schedule window:
a. select the Run by schedule check box to enable the schedule;
b. Specify the task launch frequency: In the Frequency list, select one of the following values: Hourly, Daily,
Weekly, At application startup, After application databases update (in the Update of application
databases, Update of application software modules, and Copying updates tasks, you can also select
After Administration Server has retrieved updates):
if Hourly is selected, specify the number of hours in the Every <number> h in the Task start settings
group;
if Daily is selected, specify the number of days in the Every <number> d in the Task start settings
group;
if Weekly is selected, specify the number of weeks in the Every <number> w in the Task start
settings group. Specify on which days of the week the task will be launched (on Mondays, by default).
c. In the Start at field, specify the time when the task will be launched; in the Start from field specify the date
when the schedule will become effective.
d. If necessary, specify other settings of the schedule: click the Advancedbutton and perform the following
actions in the Advanced schedule settings window:
Specify the maximum duration for the task run: enter the number of hours and minutes in the Duration
field in the Task stop settings group.
Specify a time period within 24 hours for which the task run will be paused: in the Task stop settings
group, enter the start and end values for the time period in the Pause from … until field.
Specify the date on which the schedule will become inactive: select the Cancel schedule from check
box and, in the Calendar window, select the date on which the schedule will become inactive.
Enable running of skipped tasks: select the Run skipped tasks check box.
Enable the start time randomization setting: select the Randomize the task start time within the
interval of check box and specify the setting value in minutes.
e. Click OK.
7. If the task created is for sets of computers, select the network (group) computers on which this task will be
executed.
8. In the Finish window of the Task creation wizard click the Ready button.
The task created is displayed in the Tasks window.
134
MANAG IN G ANT I -VIR US US IN G KA SPER SKY SE CUR ITY CENT ER
135
ADM INISTRA TOR' S G UIDE
You can select the Consider task as critical areas scan check box either when creating the on-demand scan
task for a group of computers or a set of computers, or later in the Properties: <Task name> window.
2. Using a new or existing policy, disable the Scan of critical areas system task on group servers.
Kaspersky Security Center Administration Server will then evaluate the security status of the protected server and will
notify you about it based on the results of the last run of the task with the Scan of critical areas status, rather than based
on the results of the Scan of critical areas system task.
You can assign the Scan of critical areas task status both to group on-demand scan tasks and to tasks for sets of
computers.
The Kaspersky Anti-Virus Console can be used to view whether the on-demand scan task is a scan critical areas task.
In the Anti-Virus console the Consider task as critical areas scan check box is displayed in the task settings, but it
cannot be edited.
136
KASPERSKY ANTI-VIRUS COUNTERS
This section provides information about Kaspersky Anti-Virus counters: performance counters for System Monitoring, as
well as SNMP counters and traps.
IN THIS SECTION
Performance counters for System Monitor .................................................................................................................... 137
Kaspersky Anti-Virus SNMP counters and traps ........................................................................................................... 141
137
ADM INISTRA TOR' S G UIDE
138
KASPERS KY ANT I- VIRUS COUNTERS
139
ADM INISTRA TOR' S G UIDE
140
KASPERS KY ANT I- VIRUS COUNTERS
IN THIS SECTION
Performance counters ................................................................................................................................................... 142
General counters ........................................................................................................................................................... 142
Update counter.............................................................................................................................................................. 142
Real-time protection counters........................................................................................................................................ 142
Quarantine counters ...................................................................................................................................................... 143
Backup counters............................................................................................................................................................ 143
Script scanning counters ............................................................................................................................................... 143
141
ADM INISTRA TOR' S G UIDE
PERFORMANCE COUNTERS
Table 56. Performance counters
COUNTER DEFINITION
GENERAL COUNTERS
Table 57. General counters
COUNTER DEFINITION
currentApplicationUptime The amount of time that Kaspersky Anti-Virus has been running since it was last
started, in hundredths of seconds
currentFileMonitorTaskStatus Real-time protection of files task state: Оn – running; Оff – stopped or paused
currentScriptCheckerTaskStatus Script Monitoring task state: Оn – running; Оff – stopped or paused
lastCriticalAreasScanAge The "age" of the last complete scan of the server's critical areas (time elapsed in
seconds since the last Scan critical area task was completed)
licenseExpirationDate License expiration date If an active and additional keys has been added, the date of
expiry of the license associated with the additional key is displayed.
UPDATE COUNTER
Table 58. Updates counter
COUNTER DEFINITION
avBasesAge "Age" of databases (time elapsed in hundredths of seconds since the creation date of the
latest updated databases installed).
COUNTER DEFINITION
totalObjectsProcessed Total number of objects scanned since the time the last Real-time protection of files
task was run
totalInfectedObjectsFound Total number of infected objects detected since the time the last Real-time protection of
files task was run
totalSuspiciousObjectsFound Total number of probably infected objects detected since the time the last Real-time
protection of files task was run
totalVirusesFound Total number of objects detected since the time the Real-time protection of files task
was last run
totalObjectsQuarantined Total number of infected or probably infected objects quarantined by Kaspersky Anti-
Virus; calculated from the time the Real-time protection of files task was last started
142
KASPERS KY ANT I- VIRUS COUNTERS
COUNTER DEFINITION
totalObjectsNotQuarantined Total number of infected or probably infected objects Kaspersky Anti-Virus attempted to
quarantine but was unable to do so; calculated from the time the Real-time protection of
files task was last started
totalObjectsDisinfected Total number of infected objects which were disinfected by Kaspersky Anti-Virus;
calculated from the time the Real-time protection of files task was last started
totalObjectsNotDisinfected Total number of infected objects which Kaspersky Anti-Virus attempted to disinfect but
was unable to do so; calculated from the time Real-time protection of files task was last
started
totalObjectsDeleted Total number of infected or probably infected objects which were deleted by Kaspersky
Anti-Virus; calculated from the time the task Real-time protection of files was last
started
totalObjectsNotDeleted Total number of infected or probably infected objects which Kaspersky Anti-Virus
attempted to delete, but was unable to do so; calculated from the time the Real-time
protection of files task Real-time protection of files was last started
totalObjectsBackedUp Total number of infected objects which were placed into Backup by Kaspersky Anti-Virus;
calculated from the time the Real-time protection of files task was last started
totalObjectsNotBackedUp Total number of infected objects which Kaspersky Anti-Virus attempted to place into
Backup but was unable to do so; calculated from the time Real-time protection of files
task was last started
QUARANTINE COUNTERS
Table 60. Quarantine counters
COUNTER DEFINITION
BACKUP COUNTERS
Table 61. Backup counters
COUNTER DEFINITION
COUNTER DEFINITION
143
ADM INISTRA TOR' S G UIDE
SNMP TRAPS
The settings of Kaspersky Anti-Virus SNMP traps are summarized in the table below.
Table 63. Kaspersky Anti-Virus SNMP traps
144
KASPERS KY ANT I- VIRUS COUNTERS
145
ADM INISTRA TOR' S G UIDE
The following table describes the settings of traps and possible parameter values.
Table 64. SNMP traps: values of the settings
146
KASPERS KY ANT I- VIRUS COUNTERS
147
ADM INISTRA TOR' S G UIDE
storageObjectNotAddedEventReason The reason why the object was not backed up or quarantined. The setting can
take the following values:
reasonUnknown(0) – reason is unknown;
reasonStorageInternalError – database error; please restore Kaspersky Anti-
Virus;
reasonStorageReadOnly – database is read-only; please restore Kaspersky
Anti-Virus;
reasonStorageIOError – input-output error: a) Kaspersky Anti-Virus is
corrupted, please restore Kaspersky Anti-Virus; b) disk with Kaspersky Anti-
Virus files is corrupted;
reasonStorageCorrupted – storage is corrupted; please restore Kaspersky
Anti-Virus;
reasonStorageFull – database is full; free up disk space;
reasonStorageOpenError – database file could not be opened; please restore
Kaspersky Anti-Virus;
reasonStorageOSFeatureError – some operating system features do not
correspond to Kaspersky Anti-Virus requirements.
reasonObjectNotFound – object being placed to Quarantine does not exist on
the disk.
reasonObjectAccessError – insufficient privileges for using Backup API: the
account under which the operation is attempted does not have Backup
Operator privileges.
reasonDiskOutOfSpace – not enough space on the disk.
148
CONTACTING TECHNICAL SUPPORT
This section describes the ways to receive technical support and the conditions on which it is available.
IN THIS SECTION
About technical support ................................................................................................................................................. 149
Technical Support via Kaspersky CompanyAccount ..................................................................................................... 149
Technical support by phone .......................................................................................................................................... 150
Using trace files and AVZ scripts................................................................................................................................... 150
Before contacting Technical Support, we recommend that you read through the support rules
(http://support.kaspersky.com/support/rules).
149
ADM INISTRA TOR' S G UIDE
To learn more about Kaspersky CompanyAccount, visit the Technical Support website
(http://support.kaspersky.com/faq/companyaccount_help).
150
GLOSSARY
A
ACTIVE KE Y
ADDITIONAL KEY
The additional key is a key that confirms the right to use the application but is not currently in use.
A set of computers associated in accordance with their functions and the pool of Kaspersky Lab applications installed on
them. Computers are grouped for the ease of management, which allows administering them as a single unit. A group
may include other groups. Group policies and group tasks can be created for each of the applications installed within one
group.
A component of Kaspersky Security Center that performs centralized storage of information about Kaspersky Lab
applications installed on the corporate network and ways of managing them.
Databases that contain information about computer security threats known to Kaspersky Lab as of the anti-virus
database release date. Anti-virus database signatures help to detect malicious code in scanned objects. Anti-virus
databases are created by Kaspersky Lab specialists and updated hourly.
APPLICATI ON SE TTINGS
Settings of the application that are common for tasks of all the types and responsible for the operation of the application
itself, for example: application performance settings, settings of reports, Backup settings.
ARCHI VE
A file that contains inside itself one or several other files, which, in their turn, may also be archives.
B
BACKUP
A dedicated storage area intended for storing backup copies of files that have been created before their first disinfection
or deletion.
D
DISINFECTI ON OF OBJ ECT S
A method of processing infected objects that results in a complete or partial recovery of data. Not every infected object
can be disinfected.
F
FALSE ALARM
A situation when a non-infected object is identified by a Kaspersky Lab application as infected because its code is similar
to that of a virus.
151
ADM INISTRA TOR' S G UIDE
FILE MAS K
H
HEURISTIC ANALYZ ER
A module of Kaspersky Anti-Virus that performs heuristic analysis.
A technology intended for detection of threats that cannot be detected using the current version of the databases of
Kaspersky Lab applications. It allows finding files that may contain some unknown virus or a ne w modification of a
known virus.
The Probably-infected status is assigned to files in which the heuristic analysis has detected malicious code.
I
INFEC TED FILE
A file that contains malicious code (i.e., when scanning the file, code of a known application that poses a threat has been
detected). Kaspersky Lab specialists recommend that you abstain from handling such files since this may lead to an
infection of your computer.
N
NETW OR K AGE NT
A component of Kaspersky Security Center that is responsible for interaction between Administration Server and
Kaspersky Lab applications installed on a specific network node (workstation or server). This component is common for
all Windows-based applications from the company's product range.
O
OLE OBJE CT
A file that has been merged or integrated into another one. Kaspersky Lab applications allow scanning OLE objects for
viruses. For example, if you embed a Microsoft Office Excel® spreadsheet into a Microsoft Office Word document, the
former will be scanned as OLE object.
P
POSSI BLY INFE CTE D FIL E
A file that contains either modified code of a known virus, or code that is similar to one but still unknown to Kaspersky
Lab. Possibly files can be detected by means of the heuristic analyzer.
A file with a specific structure or format that may be used by criminals to convert this file into a container for storing and
spreading malicious code. As a rule, they include executable files, for example, those with com, exe, dll, and other similar
extensions. The risk of malicious code penetration into such files is rather high.
152
GLOSSARY
Q
QUA RA NTI NE
The folder to which Kaspersky Anti-Virus moves possibly infected objects that have been detected. Files are stored in
Quarantine in encrypted form in order to avoid any impact on the computer.
S
SIGNAT URE ANALYSIS
The technology of threat detection, which uses databases of Kaspersky Anti-Virus that contain descriptions of known
threats and methods of neutralizing them. Protection with signature analysis ensures the minimum admissible security
level. According to recommendations of Kaspersky Lab specialists, this analysis method is always enabled.
A set of applications that are required for start and proper operation of the operating system and software installed on the
computer. Every time the operating system boots, it runs those objects. There are viruses aimed at infecting such
objects, which may result, for example, in blocked booting of the operating system.
T
TAS K
Functions performed by a Kaspersky Lab application are implemented as tasks, for example: Real-time protection of
files, Full Scan, Update application databases.
Settings of the application that are specific for each task type.
U
UPDATE
A procedure that consists in replacing / adding new files (databases or application modules) retrieved from Kaspersky
Lab update servers.
V
VULNE RA BILITY
A flaw in the operating system or in an application that may be exploited by malicious programs in order to intrude into
the operating system or application and corrupt its integrity. A large number of vulnerabilities in the operating system
makes its operation unreliable, because viruses that have intruded into the operating system may provoke failures in the
system's operation or errors in the operation of installed applications.
153
KASPERSKY LAB
Kaspersky Lab software is internationally renowned for its protection against viruses, malware, spam, network and
hacker attacks, and other threats.
In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software solutions
for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred developer of
computer protection systems among home users in Russia, according to the COMCON survey "TGI-Russia 2009".
Kaspersky Lab was founded in Russia in 1997. Today Kaspersky Lab is an international group of companies
headquartered in Moscow and comprising five regional divisions, which manage the company's operations in Russia,
Western and Eastern Europe, the Middle East, Africa, Northern and Southern America, Japan, China, and other
countries of the Asia-Pacific region. The company employs more than 2,000 skilled professionals.
PRODUCTS. Kaspersky Lab products provide protection for all systems—from home computers to large corporate
networks.
The personal product range includes anti-virus applications for desktop, laptop, and tablet computers, and for
smartphones and other mobile devices.
Kaspersky Lab delivers applications and services to protect workstations, file and web servers, mail gateways, and
firewalls. Used in conjunction with Kaspersky Lab’s centralized management system, these solutions ensure effective
automated protection for companies and organizations against computer threats. Kaspersky Lab products are certified by
major testing laboratories, compatible with the applications of most software vendors, and optimized for work on most
hardware platforms.
Kaspersky Lab virus analysts work around the clock. Every day they uncover hundreds of new computer threats, create
tools to detect and disinfect them, and include them in the databases used by Kaspersky Lab applications. Kaspersky
Lab's Anti-Virus database is updated hourly; and the Anti-Spam database every five minutes.
TECHNOLOGIES. Many technologies that are now part and parcel of modern anti-virus tools were originally developed
by Kaspersky Lab. It is no coincidence that many other developers use the Kaspersky Anti-Virus kernel in their products,
including: SafeNet (USA), Alt-N Technologies (USA), Blue Coat Systems (USA), Check Point Software Technologies
(Israel), Clearswift (UK), CommuniGate Systems (USA), Openwave Messaging (Ireland), D-Link (Taiwan), M86 Security
(USA), GFI Software (Malta), IBM (USA), Juniper Networks (USA), LANDesk (USA), Microsoft (USA), Netasq+Arkoon
(France), NETGEAR (USA), Parallels (USA), SonicWALL (USA), WatchGuard Technologies (USA), ZyXEL
Communications (Taiwan). Many of the company’s innovative technologies are patented.
ACHIEVEMENTS. Over the years, Kaspersky Lab has won hundreds of awards for its services in combating computer
threats. For example, in 2010 Kaspersky Anti-Virus received several top Advanced+ awards in a test administered by
AV-Comparatives, a reputed Austrian anti-virus laboratory. But Kaspersky Lab's main achievement is the loyalty of its
users worldwide. The company’s products and technologies protect more than 300 million users, and its corporate clients
number more than 200,000.
154
INFORMATION ABOUT THIRD-PARTY CODE
Information about third-party code is contained in a file named legal_notices.txt and stored in the application installation
folder.
155
TRADEMARK NOTICES
Registered trademarks and service marks are the property of their respective owners.
Citrix, Citrix Presentation Server, XenApp, and XenDesktop are registered trademarks of Citrix Systems, Inc. and/or
subsidiaries in the United States and/or elsewhere.
Celerra, EMC, Isilon, OneFS, and VNX are either registered trademarks or trademarks of EMC Corporation in the United
States and/or elsewhere.
Core and Intel are trademarks of Intel Corporation registered in the United States and/or elsewhere.
Domino, IBM, Lotus Notes, System Storage are trademarks of International Business Machines Corporation registered
all over the world.
Active Directory, Excel, Forefront, Hyper-V, Internet Explorer, JScript, Lync, Microsoft, Outlook, SharePoint, SQL Server,
Windows, Windows Server, and Windows Vista are trademarks of Microsoft Corporation registered in the United States
and elsewhere.
Data ONTAP and NetApp are either registered trademarks or trademarks of NetApp, Inc. in the United States and/or
elsewhere.
156
INDEX
A
Access permissions to Anti-Virus functions ..................................................................................................................29
Access to Anti-Virus functions ......................................................................................................................................29
Action
infected objects ................................................................................................................................................. 52, 65
suspicious objects............................................................................................................................................. 52, 65
Actions on objects depending on the threat type .................................................................................................... 52, 65
Administration Server .................................................................................................................................................119
Anti-Virus settings ................................................................................................................................................ 34, 127
Application interface
Icon in taskbar notification area ..............................................................................................................................30
Archives ................................................................................................................................................................. 52, 65
B
Backup storage folder .......................................................................................................................................... 83, 122
Bacup ...........................................................................................................................................................................80
C
Configuring
security settings ......................................................................................................................................................51
D
Databases ....................................................................................................................................................................39
automatic updates ...................................................................................................................................... 37, 39, 42
Date created ...........................................................................................................................................................31
manual update ........................................................................................................................................................42
DCOM ..........................................................................................................................................................................22
Delimitation of permissions to Anti-Virus functions .......................................................................................................29
Disinfection of objects ............................................................................................................................................ 52, 65
E
Event log ......................................................................................................................................................................85
Event Log .....................................................................................................................................................................90
F
Folder for restoration
quarantine....................................................................................................................................................... 78, 121
Folder to save updates in .............................................................................................................................................44
FTP server ............................................................................................................................................................. 42, 44
H
HTTP server ..................................................................................................................................................... 40, 42, 44
I
Icon in taskbar notification area ....................................................................................................................................30
K
Kaspersky Anti-Virus
running at operating system startup......................................................................................................................102
Kaspersky Lab ZAO ...................................................................................................................................................154
KAVWSEE Administrators ............................................................................................................................................23
Key ....................................................................................................................................................................... 92, 110
157
ADM INISTRA TOR' S G UIDE
L
Launching missed tasks ...............................................................................................................................................37
License
End User License Agreement .................................................................................................................................20
key file ....................................................................................................................................................................21
removing .................................................................................................................................................................92
Log folder ............................................................................................................................................................. 90, 128
M
Maximum size
object being scanned ........................................................................................................................................ 52, 65
quarantine....................................................................................................................................................... 78, 121
MMC....................................................................................................................................................................... 22, 25
N
Notifications ................................................................................................................................................................125
O
Object restoration ................................................................................................................................................... 75, 81
P
Policy..........................................................................................................................................................................128
Port TCP 135.......................................................................................................................................................... 23, 24
Program interface.........................................................................................................................................................22
Protection mode ...........................................................................................................................................................54
Proxy server .................................................................................................................................................................42
Purging system audit log ..............................................................................................................................................87
Q
Quarantine
deleting an object....................................................................................................................................................77
free space threshold ....................................................................................................................................... 78, 121
object restoration ....................................................................................................................................................75
R
Restoring the default settings ................................................................................................................................. 51, 64
S
Scan
maximum object scan time ............................................................................................................................... 52, 65
new and modified objects only .......................................................................................................................... 52, 65
security level ..................................................................................................................................................... 51, 64
Scan alternate NTFS streams ................................................................................................................................ 52, 65
Scan scope exclusions ..................................................................................................................................... 52, 65, 68
Scanning storages for viruses ......................................................................................................................................74
Statistics .......................................................................................................................................................................31
T
Task .............................................................................................................................................................................35
adding the key ................................................................................................................................................ 92, 110
Task execution log
event storage period ...............................................................................................................................................34
Task recovery ....................................................................................................................................................... 34, 127
Tasks
group ....................................................................................................................................................................132
Tasks schedule ............................................................................................................................................................37
158
INDEX
Threat types
action ................................................................................................................................................................ 52, 65
Trusted zone
exclusion rules ........................................................................................................................................................68
trusted applications .................................................................................................................................................68
U
Updates
application modules ................................................................................................................................................39
rolling back to the previous update ................................................................................................................. 46, 109
scheduled ......................................................................................................................................................... 37, 42
Updates content ...........................................................................................................................................................44
Updates source ...................................................................................................................................................... 42, 44
UPS power ........................................................................................................................................................... 34, 127
159