ks4ws Netstorage Guide en
ks4ws Netstorage Guide en
Thank you for choosing Kaspersky Lab as your security software provider. We hope that this document helps you
to use our product.
Attention! This document is the property of AO Kaspersky Lab (herein also referred to as Kaspersky Lab). All rights
to this document are reserved by the copyright laws of the Russian Federation and by international treaties. Illegal
reproduction and distribution of this document or parts hereof incur civil, administrative, or criminal liability
under applicable law.
Any type of reproduction or distribution of any materials, including translations, is allowed only with the written
permission of Kaspersky Lab.
This document, and graphic images related to it, may be used for informational, non-commercial, and personal
purposes only.
Kaspersky Lab reserves the right to amend this document without additional notification.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this
document to which rights are held by third parties, or for any potential harms associated with use of the document.
Registered trademarks and service marks used in this document are the property of their respective owners.
https://www.kaspersky.com
https://support.kaspersky.com
In this Guide you can find information about configuring and using Kaspersky Security for Windows Server
for network attached storage protection.
This Guide will also help you to learn about sources of information about the application and ways to receive
technical support.
It is implied that by the moment you are reading this document you have already had a copy of the application
with the RPC Network Storage Protection, ICAP Network Storage Protection and Anti-Cryptor for NetApp
components installed and a key with support of the Network Attached Storage Protection feature added
to the application (for installation and licensing information please refer to the Kaspersky Security for Windows
Server Administrator's Guide).
In this chapter
In this document ............................................................................................................................................ 6
Document conventions .................................................................................................................................. 8
In this document
The Implementation Guide for Network Attached Storage Protection contains the following sections:
Integrating Kaspersky Security for Windows Server with network attached storages
This section describes the principles of joint operation of Kaspersky Security for Windows Server and network
attached storages.
Glossary
This section contains a list of terms, which are mentioned in the document, as well as their respective definitions.
AO Kaspersky Lab
This section provides information about Kaspersky Lab AO.
Warnings are highlighted in red and set off in a box. Warnings contain
information about actions that my have undesirable consequences.
Note that...
Notes are set off in a box. Notes contain supplementary and reference
information.
We recommend that you use...
Press ENTER. Names of keyboard keys appear in bold and are capitalized.
Press ALT+F4. Names of keys that are connected by a + (plus) sign indicate the use
of a key combination. These keys must be pressed simultaneously.
Click the Enable button. Names of application interface elements, such as text boxes, menu items,
and buttons, are set off in bold.
Introductory phrases of instructions are italicized and accompanied
► To configure a task by an arrow.
schedule:
In the command line, type help The following types of text content are set off with a special font:
The following message Text in the command line
then appears: Text of messages displayed on the screen by the application
Data that must be entered from the keyboard
Specify the date
in dd:mm:yy format.
<User name> Variables are enclosed in angle brackets. Instead of a variable,
the corresponding value should be inserted, omitting the angle brackets.
You can select the most suitable information source, depending on the importance level and urgency of the issue.
In this chapter
Sources for independent retrieval of information ........................................................................................... 9
Discussing Kaspersky Lab applications on the forum ................................................................................. 10
Kaspersky Security for Windows Server page on the Kaspersky Lab website
Kaspersky Security for Windows Server page on the Technical Support website (Knowledge Base)
Online help
Manuals
If you did not find a solution to your problem, contact Kaspersky Lab Technical Support.
Kaspersky Security for Windows Server page on the Kaspersky Lab website
On the Kaspersky Security for Windows Server page (https://www.kaspersky.com/small-to-medium-business-
security/windows-server-security), you can view general information about the application, its functions
and features.
The Kaspersky Security for Windows Server page contains a link to eStore. There you can purchase
the application or renew your license.
The Kaspersky Security for Windows Server page (https://support.kaspersky.com/ksws10) in the Knowledge Base
features articles that provide useful information, recommendations, and answers to frequently asked questions
about how to purchase, install, and use the application.
Knowledge Base articles can answer questions relating to not only Kaspersky Security for Windows Server but
also to other Kaspersky Lab applications. Knowledge Base articles can also include Technical Support news.
In the Implementation Guide for Network Attached Storage Protection you can find information about configuring
and using Kaspersky Security for Windows Server for the network attached storage protection.
On this forum you can view existing threads, leave your comments, and create new discussion threads.
You can install Kaspersky Security for Windows Server on the following servers:
Terminal servers.
Print servers.
Application servers.
Domain controllers.
Servers that are protecting network attached storages.
File servers – these servers are more likely to get infected because they exchange files
with user workstations.
Kaspersky Security for Windows Server can be managed in the following ways:
Via the Application Console installed on the same server as Kaspersky Security for Windows Server or
on a different computer.
Using commands in the command line.
Via Kaspersky Security Center Administration Console.
The Kaspersky Security Center application can also be used for centralized administration of multiple servers
running Kaspersky Security for Windows Server.
It is possible to review Kaspersky Security for Windows Server performance counters for the "System Monitor"
application, as well as SNMP counters and traps.
Real-Time File Protection. Kaspersky Security for Windows Server scans objects when they
are accessed. Kaspersky Security for Windows Server scans the following objects:
Files
Alternate file system streams (NTFS streams)
Master boot record and boot sectors on local hard and removable drives
On-Demand Scan. Kaspersky Security for Windows Server runs a single scan of the specified area
for viruses and other computer security threats. Application scans files, RAM, and startup objects
on a protected server.
Applications Launch Control. The component tracks users' attempts to launch applications and controls
applications launches.
Database Update and Software Modules Update. Kaspersky Security for Windows Server downloads
updates of application databases and modules from FTP or HTTP update servers of Kaspersky Lab,
Kaspersky Security Center Administration Server, or other update sources.
Quarantine. Kaspersky Security for Windows Server quarantines probably infected objects by moving such
objects from their original location to Quarantine. For security purposes, objects are stored in Quarantine
in encrypted form.
Backup. Kaspersky Security for Windows Server stores encrypted copies of objects classified as Infected
or Probably infected in Backup before disinfecting or deleting them.
Administrator and user notifications. You can configure the application to notify the administrator and
users who access the protected server about events in Kaspersky Security for Windows Server operation
and the status of Anti-Virus protection on the server.
Importing and exporting settings. You can export Kaspersky Security for Windows Server settings
to an XML configuration file and import settings into Kaspersky Security for Windows Server from
the configuration file. You can save all application settings or only settings for individual components
to a configuration file.
Applying templates. You can manually configure a node's security settings in the tree or in a list
of the computer file resources, and save the configured setting values as a template. This template
can then be used to configure the security settings of other nodes in Kaspersky Security for Windows
Server protection and scan tasks.
Managing access permissions for Kaspersky Security for Windows Server functions. You
can configure the rights to manage Kaspersky Security for Windows Server and the Windows services
registered by the application, for users and groups of users.
In this chapter
Requirements for the server on which Kaspersky Security for Windows Server is deployed ..................... 14
Requirements for the protected network attached storage ......................................................................... 16
Requirements for the computer on which the Application Console is installed ........................................... 17
Before installing Kaspersky Security for Windows Server, you must uninstall other anti-virus applications from
the server.
Before installing Kaspersky Security for Windows Server 10.1, you must uninstall Kaspersky Anti-Virus 8.0 for
Windows Servers Enterprise Edition. You can install Kaspersky Security for Windows Server 10.1 without
uninstalling Kaspersky Security 10 for Windows Server or later.
For installation and operation of Kaspersky Security for Windows Server, Microsoft Windows Installer 3.1 must be
installed on the server.
You can install Kaspersky Security for Windows Server on a server under one of the following 32-bit Microsoft
Windows operating systems:
The following operating systems are no longer supported by Microsoft Windows: Windows Server 2003
Standard / Enterprise / Datacenter SP2, Windows Server 2003 R2 Standard / Enterprise / Datacenter SP2 32-
bit, 64-bit. There might be limitations for the technical support of servers running these operating systems on
the Kaspersky Lab side.
You can install Kaspersky Security for Windows Server on the following terminal servers:
The computer should have Microsoft Windows Installer 3.1 in order to support installation and operation of the
Application Console.
You can install the Application Console on a computer running one of the following 32-bit Microsoft Windows
operating systems:
When an attempt is made to read or write a file stored in a network attached storage, this storage initiates
a network request and hands the file to CAVA. CAVA writes the received file to a local disk of the computer, saving
it in a dedicated folder. The Real-Time File Protection component intercepts the file operation and scans the file
in accordance with the settings defined in the Real-Time File Protection task, for example, disinfecting or deleting
the file. CAVA analyzes Kaspersky Security for Windows Server actions and uses this information to create
the check result and hand it to the network attached storage.
Kaspersky Security for Windows Server maintains a continuous connection with the network attached storage and
regularly initiates RPC requests. When an attempt is made to read or create / write to a file stored in a network
attached storage, the latter provides Kaspersky Security for Windows Server direct access to the file using
the CIFS protocol. The RPC Network Storage Protection component scans the file in accordance with the settings
defined in the RPC Network Storage Protection task. When a threat is detected, Kaspersky Security for Windows
Server performs the actions defined in the task settings (including file disinfection or deletion) on the file, and then it
sends the scan result to the network attached storage.
When an attempt is made to read or create / write to a file stored in a network attached storage, the latter
generates an ICAP request to Kaspersky Security for Windows Server and sends the file inside this request.
The ICAP Network Storage Protection component scans the file in accordance with the settings defined in the ICAP
Network Storage Protection task. When a threat is detected, Kaspersky Security for Windows Server performs
the actions defined in the task settings on the file, and then it returns the scan result to the network attached
storage. If the Disinfect action is specified in the settings, and the file is successfully disinfected, Kaspersky
Security for Windows Server returns the disinfected file to the network attached storage as the response
to the request.
Integrating Kaspersky Security for Windows Server with network attached storages
20
Preparing for launch of the Network Attached Storage
Protection task
This section provides instructions on how to prepare a Microsoft Windows with Kaspersky Security for Windows
Server installed for integration with network data storage systems and subsequent launch of the Network Attached
Storage Protection task.
If you are planning to use Network Attached Storage Protection on the server running the Microsoft Windows
Server 2019 operating system, make sure that the SMB1.0/CIFS File Sharing Support feature is installed. Detailed
information about can be found in the Microsoft Windows documentation and corresponding online resources.
The names of settings may vary under different Windows operating systems.
► To define the security settings of local policies in the local group policy editor:
1. Open the Local group policy editor using one of the following methods:
If you define the settings locally, click the Start button, enter the gpedit.msc command
at the search bar, and press ENTER.
If you define the settings from another computer:
a. Click the Start button, enter the mmc command at the search bar, and press ENTER.
The Management Console window opens.
b. In the window that opens, select File > Add or remove a snap-in.
The Add or remove snap-ins window opens.
c. In the list of available snap-ins, select the Group policy object editor snap-in and click
the Add button.
The Group Policy Wizard starts.
d. In the Wizard window, click the Browse button.
The Search group policy object window opens.
e. In the window that opens, on the Computers tab, select Another computer and specify a server
with Kaspersky Security for Windows Server installed, using one of the following methods:
In the entry field, specify the domain name of a server with Kaspersky Security for Windows
Server installed.
Click the Browse button and, in the computer selection window that opens, select a server
with Kaspersky Security for Windows Server installed, using search by domain or
by workgroup.
2. Click OK.
The changes will be saved.
3. Select Computer configuration > Windows configuration > Security settings > Local policies >
Security settings.
Integrating Kaspersky Security for Windows Server with network attached storages
21
4. Specify the following values for network access settings:
Network access: Let For everyone permissions apply to anonymous users – Enabled
Network access: Do not allow anonymous enumeration of SAM accounts – Disabled
Network access: Restrict anonymous access to named pipes and shares – Disabled
5. Restart the server with Kaspersky Security for Windows Server installed.
The applied changes take effect.
The names of settings may vary under different Windows operating systems.
If all outbound connections are denied, open the following ports: TCP 443 (RPC(HTTP)), TCP 445
(SMB), TCP 88 (Kerberos), TCP 53 (DNS), UDP 53 (DNS).
Integrating Kaspersky Security for Windows Server with network attached storages
22
By default, Windows firewall allows all inbound connections for which no denying rules have been set.
If the default settings are applied, no rule should be created for outbound connections.
The Windows firewall settings can also be defined by a group or domain policy.
Integrating Kaspersky Security for Windows Server with network attached storages
23
Managing Kaspersky Security for
Windows Server Console
This section provides information about Kaspersky Security for Windows Server Console and describes how
to manage Kaspersky Security for Windows Server using the Application Console installed on the protected server
or a different computer.
In this chapter
About the Kaspersky Security for Windows Server Console....................................................................... 24
Starting the Kaspersky Security for Windows Server Console from Start menu......................................... 25
Kaspersky Security for Windows Server Console interface ........................................................................ 26
Viewing status information for Network Attached Storage Protection ......................................................... 29
Managing Network Attached Storage Protection tasks ............................................................................... 31
The application can be managed via the Application Console installed on the protected server or on another
computer on the corporate network.
Detailed information about installation and configuration of the Application Console is provided in the Kaspersky
Security for Windows Server Administrator's Guide.
If the Application Console and Kaspersky Security for Windows Server are installed on different computers
assigned to different domains, limitations may be imposed on delivery of information from the application
to the Application Console. For example, after any application task starts, its status may remain unchanged
in the Application Console.
During installation of the Application Console the installation wizard creates the kavfs.msc file in the Installation
folder and adds Kaspersky Security for Windows Server snap-in to the list of isolated Microsoft Windows snap-ins.
You can start the Application Console from the Start menu. The Kaspersky Security for Windows Server snap-in
msc-file can be run or the Kaspersky Security for Windows Server snap-in can be added to the existing Microsoft
Management Console as a new element in the tree.
Multiple Kaspersky Security for Windows Server snap-ins can be added to one Microsoft Management Console
opened in author mode to use it to manage the protection of multiple servers on which Kaspersky Security for
Windows Server is installed.
in the Start menu select All Programs > Kaspersky Security for Windows Server > Administration
Tools > Kaspersky Security for Windows Server Console.
To add other snap-ins to the Application Console, start the Application Console in author mode.
► To start the Application Console in author mode, take the following steps:
1. In the Start menu select Programs > Kaspersky Security for Windows Server > Administration Tools.
2. In the context menu of the Application Console, select the Author command.
The Application Console is started in author mode.
If the Application Console has been started on the protected server, the Application Console window opens.
If you have started the Application Console not on a protected server but on a different one, connect
to the protected server.
1. In the Application Console tree, open the context menu of the Kaspersky Security node.
2. Select the Connect to another computer command.
The Select computer window opens.
3. Select Another computer in the window that opens.
4. Specify the network name of the protected server in the entry field on the right.
5. Click OK.
The Application Console will be connected to a protected server.
If the user account that you are using to log in to Microsoft Windows does not have sufficient permissions to access
Kaspersky Security Management Service on the server, select the Connect as user check box and specify
a different user account that has such permissions.
After a connection has been established to Kaspersky Security for Windows Server installed on a different server,
the name of the node is supplemented with the name of the server on which the application is installed and
the name of the user account under which the connection has been established: Kaspersky Security <server
name> as <account name>. Upon connection to Kaspersky Security for Windows Server installed on the same
server with the Application Console, the node name is Kaspersky Security.
Real-Time Server Protection: manages real-time protection tasks and KSN services. The Real-Time
Server Protection node allows to configure the following tasks:
Real-Time File Protection
Script Monitoring
KSN Usage
Traffic Security
Anti-Cryptor
Server Control: controls launches of applications installed on a protected server, as well as external
devices connections. The Server Control node allows to configure the following tasks:
Applications Launch Control
Device Control
Firewall Management
Automated rule generators: configuring automatic generation of group and system rules
for the Applications Launch Control task and the Device Control task.
Rule Generator for Applications Launch Control
Rule Generator for Device Control
Rule generation group tasks <Task names> (if any)
Group tasks are created using Kaspersky Security Center. You cannot manage group tasks through
the Application Console.
System Inspection: configuring file operations control and Windows Event Log inspection settings.
File Integrity Monitor
Details pane
The details pane displays information about the selected node. If the Kaspersky Security node is selected,
the details pane displays information about the current server protection status and information about Kaspersky
Security for Windows Server, the protection status of its functional components, and the license expiration date.
Connect to another computer. Connect to another computer to manage Kaspersky Security for Windows
Server installed on it. You can also perform this operation by clicking the link in the lower right corner
of the details pane of the Kaspersky Security node.
Start the service / Stop the service. Start or stop application or a selected task. To carry out these
operations, you can also use the buttons on the toolbar. You can also perform these operations in context
menus of application tasks.
Configure removable drives scan settings. Configure scanning of removable drives connected
to the protected server via the USB port.
Exploit Prevention: general settings. Configure the Exploit Prevention mode and set up
preventing actions.
Exploit Prevention: processes protection settings. Add processes for protection and select the exploit
prevention techniques.
Configure Trusted Zone settings. View and configure Trusted Zone settings.
Modify user rights of the application management. View and configure permissions to access
Kaspersky Security for Windows Server functions.
Modify user rights of Kaspersky Security Service management. View and configure user rights
to manage Kaspersky Security Service.
Hierarchical storage. Configure access method of the HSM system.
Export settings. Save the application settings in a configuration file in XML format. You can also perform
this operation in context menus of application tasks.
Import settings. Import application settings from a configuration file in XML format. You can also perform
this operation in context menus of application tasks.
Information about the application and available module updates. See information about Kaspersky
Security for Windows Server and currently available application modules updates.
Refresh. Refresh the contents of the Application Console window. You can also perform this operation
in context menus of application tasks.
Properties. View and configure settings of Kaspersky Security for Windows Server or a selected task. You
can also perform this operation in context menus of application tasks.
To do so, you can also use the Application properties link in the details pane of the Kaspersky
Security node or use the button on the toolbar.
Help. View information Kaspersky Security for Windows Server Help. You can also perform this operation
in context menus of application tasks.
Toolbar and context menu of Kaspersky Security for Windows Server tasks
You can manage Kaspersky Security for Windows Server tasks using the items of context menus of each task
in the Application Console tree.
Resume / Pause. Resume or pause task execution. To carry out these operations, you can also use
the buttons on the toolbar. This operation is available for the Real-Time Protection tasks and the On-
Demand Scan tasks.
Add task. Create new custom task. This operation is available for On-demand scan tasks.
Open log. View and manage a task log. This operation is available for all tasks.
Save task. Save and apply modified task settings. This operation is available for Real-Time File Protection
and On-Demand Scan tasks.
Remove task. Delete custom task. This operation is available for On-demand scan tasks.
Statistics. View task statistics. This operation is available for the Application Integrity Control task.
Settings templates. Manage templates. This operation is available for Real-Time File Protection and On-
Demand Scan.
By default, information in the details pane of Kaspersky Security for Windows Server Console
is refreshed automatically:
select the Refresh command in the context menu of the Kaspersky Security node.
Information about the status of protected network attached storages is displayed in the details pane
of the Kaspersky Security node on the Network Attached Storage Protection tab.
The Real-Time Protection section displays information about the RPC and ICAP Network Storage Protection
tasks, and the Celerra / VNX integration status (see table below).
Network Attached Storage The color of the panel with the name of the section reflects the status of tasks
Protection status described in the section. The indicator can take the following values:
indicator Green is displayed in the following case: RPC Network Storage Protection
and ICAP Network Storage Protection tasks are running.
Yellow is displayed in the following cases:
RPC Network Storage Task status field displays current task status, for example, Running
Protection or Stopped.
Detected field displays the number of malicious objects detected on RPC
network storage shared folders. If the number of detected software exceeds 0,
the row value is highlighted in red.
ICAP Network Storage Task status field displays current task status, for example, Running or Stopped.
Protection
Detected field specifies the number of malicious objects detected on ICAP
network storage shared folders. If the number of detected software exceeds 0,
the row value is highlighted in red.
Connection to EMC The following values are possible:
Celerra / VNX Celerra / VNX Anti-Virus Agent not found. Kaspersky Security for
Windows Server cannot find any EMC software, or an error has occurred
in the integration code.
Protection disabled. Kaspersky Security for Windows Server
has established a connection to EMC software, but the Real-Time File
Protection task is not running in Kaspersky Security for Windows Server.
Protection enabled. Kaspersky Security for Windows Server
has established a connection to EMC software, and the Real-Time File
Protection task is running in Kaspersky Security for Windows Server.
The Anti-Cryptor protection section (see the table below) displays information about the Anti-Cryptor for NetApp
task status.
Anti-Cryptor The color of the panel with the name of the section reflects the status of tasks being
protection status performed in the section. The indicator can take the following values:
indicator
Green color of the panel – the Anti-Cryptor for NetApp task is running.
Red color of the panel – the Anti-Cryptor for NetApp task is not running.
Anti-Cryptor Task status – current task status, for example, Running or Stopped.
for NetApp Mode – one of the two available modes for the Anti-Cryptor for NetApp task.
Hosts blocked – the number of compromised hosts that were blocked when
attempting to access the network shared folders on the protected server.
If you changed the settings of a running task, the new settings are applied immediately after saving
the task.
If you changed the settings of a stopped (paused) task, the new settings are applied when the task
is next started.
If after changing task settings another node in the Application Console tree is selected without first selecting
the Save task command, the window for saving the settings appears.
1. Open the context menu of the task name in Kaspersky Security for Windows Server Console.
2. Select one of the items: Start or Stop.
The operation is performed and logged in the system audit log.
1. Open the context menu of the name of the task for which you wish to configure the launch schedule.
2. Select Properties.
3. The Task settings window opens.
4. In the window that opens, on the Schedule tab, select the Run by schedule check box.
Fields containing the On-demand scan task and Update task schedule settings will be unavailable if
the launch of this scheduled task is disabled by the Kaspersky Security Center policy.
After the task startup frequency has been specified, the time of the first task launch, and the date
from which the schedule applies, information about the calculated time for the next task launch
will appear in the top part of the window in the Next start field. Updated information about
the estimated time of the next task launch will be displayed each time you open the Task settings
window of the Schedule tab.
The Blocked by policy value is displayed in the Next start field if the active policy settings
of Kaspersky Security Center prohibit launching scheduled system tasks.
6. Using the Advanced tab configure the following schedule settings in accordance with your requirements.
1. Open the context menu of the name of the task for which you wish to configure the launch schedule.
2. Select Properties.
The Task settings window opens.
3. In the window that opens on the Schedule tab, do one of the following:
Select the Run by schedule check box if you want to enable the scheduled launch of the task
Select the Run by schedule check box if you want to enable scheduled task launch
The configured task launch schedule settings are not deleted and will be applied at the next
scheduled launch of the task.
In this chapter
About protection of EMC network attached storages of the Celerra / VNX group ...................................... 34
Integrating Kaspersky Security for Windows Server with an EMC network attached storage of the Celerra /
VNX group ................................................................................................................................................... 35
Kaspersky Security for Windows Server scans files located in network share folders in the EMC network attached
storage of the Celerra / VNX group when an attempt is made to read or modify the files from a workstation.
The network attached storage allows reading or modifying a file if Kaspersky Security for Windows Server
has identified that file as safe. If Kaspersky Security for Windows Server has identified a file as infected or probably
infected, the network attached storage blocks that file from being read or modified.
Kaspersky Security for Windows Server allows you to configure the actions that the application will perform
on infected and probably infected files.
By default, Kaspersky Security for Windows Server performs the following operations:
Protection of the Celerra / VNX network attached storage is provided by the Real-Time File Protection task.
Detailed information about the Real-Time File Protection task is provided in the Kaspersky Security for Windows
Server Administrator's Guide.
Integration of Kaspersky Security for Windows Server with a Celerra / VNX network attached storage is performed
when the following conditions are met:
1. The CAVA (Celerra Antivirus Agent) software agent that is part of the EMC Celerra / VNX software
package is installed on the computer protected by Kaspersky Security for Windows Server. The application
interacts with the EMC network attached storage of the Celerra / VNX group through this program agent.
2. Real-Time File Protection task is started.
For detailed information about the Real-Time File Protection task and instructions on how to configure
its settings, refer to the Kaspersky Security for Windows Server Administrator's Guide.
The status of Kaspersky Security for Windows Server (see Section "Viewing status information for Network
Attached Storage Protection" on page 29) integration with the Celerra / VNX network attached storage is shown
in the details pane of the Kaspersky Security node.
In this chapter
About the RPC Network Storage Protection ............................................................................................... 36
About scanning symbolic links ..................................................................................................................... 37
About scanning snapshots and other read-only volumes and folders ......................................................... 37
Configuring a connection between an RPC network storage and Kaspersky Security for Windows
Server .......................................................................................................................................................... 38
Configuring the RPC Network Storage Protection task ............................................................................... 41
Security levels in the RPC Network Storage Protection task ...................................................................... 46
Viewing statistics of the RPC Network Storage Protection task .................................................................. 52
Kaspersky Security for Windows Server scans files located in network share folders in the RPC network storage
(hereinafter also network attached storage) when an attempt is made to read or modify the files from a workstation.
The network attached storage allows reading or modifying a file if Kaspersky Security for Windows Server
has identified that file as safe. If Kaspersky Security for Windows Server has identified a file as infected or probably
infected, the network attached storage performs the action according to the configured settings (e.g., blocks that file
from being read or modified).
Kaspersky Security for Windows Server allows you to configure the actions that the application will perform
on infected and probably infected files.
By default, Kaspersky Security for Windows Server performs the following operations:
The RPC Network Storage Protection task is created by default; it is a system task of Kaspersky Security for
Windows Server. You cannot delete or rename this task. You cannot create custom tasks for RPC Network
Storage Protection.
You can configure the RPC Network Storage Protection task. Settings configured in the RPC Network Storage
Protection task properties are applied to all protection scopes that are added to the task. You can also configure
the security settings for each protection scope.
You can run Network Attached Storage Protection tasks if the active key supports network attached storage
protection. If you run a Network Attached Storage Protection task when the active key does not support
network attached storage protection, the task returns an error. In this case, Kaspersky Security for Windows
Server does not protect network attached storages.
The RPC Network Storage Protection component is available within Kaspersky Security for Windows Server
for Network attached storages.
For more details on solutions for protection of organizations that include Kaspersky Security for Windows
Server, see the Kaspersky Security for Windows Server Administrator's Guide.
You can run Network Attached Storage Protection tasks if the active key supports network attached storage
protection. If you run a Network Attached Storage Protection task when the active key does not support
network attached storage protection, the task returns an error. In this case, Kaspersky Security for Windows
Server does not protect network attached storages.
To protect an RPC network storage, you need to configure the connection of the network attached storage
to Kaspersky Security for Windows Server.
► To configure a connection between a network attached storage and Kaspersky Security for Windows
Server:
1. Configure the following settings on the server with Kaspersky Security for Windows Server installed:
Add a network attached storage to Kaspersky Security for Windows Server (see Section "Adding
an RPC network storage to Kaspersky Security for Windows Server" on page 40).
In Kaspersky Security for Windows Server Console, specify the user account under which you want
to run the RPC Network Storage Protection task (see Section "Selecting a user account for running
the RPC Network Storage Protection task" on page 39).
In the local group policy editor, configure the security settings of local policies (see Section
"Configuring security settings of local policies in the local group policy editor" on page 21).
In the Windows firewall settings window, configure the rules of outbound and inbound connections
in Windows firewall (see Section "Configuring inbound and outbound connections in Windows firewall"
on page 22).
If necessary, install a connector application for the RPC network storage to be protected by Kaspersky
Security for Windows Server.
You can find information on how to install the connector application for the protected network attached
storage in the accompanying manual.
You can find information on how to configure your network attached storage in the accompanying manual.
The connection between an RPC network storage and Kaspersky Security for Windows Server is established.
The user account under which the RPC Network Storage Protection task will be run must have administrator
rights on the server with Kaspersky Security for Windows Server installed and must be included in the Backup
Operators group in the network attached storage.
If the network attached storage and the server with Kaspersky Security for Windows Server installed
are in the same domain, you can use the domain account. If the network attached storage and the server
with Kaspersky Security for Windows Server installed are in the same work group, you can use local accounts
with the same user name and the same password.
Only a domain account can be used for network storages running under the Data ONTAP operating system
of version 8.2.1 or later in cluster mode.
If more than one user account exists on the Kaspersky Security for Windows Server side, make sure the user
under which you configure and start the RPC Network Storage Protection task is added to the privileged users
list for working with NetApp. If the user account does not have required privileges, files on the network
attached storage shared folders can be accessed, but no scanning will be performed by the running protection
tasks.
► To specify a user account under which the RPC Network Storage Protection task is started:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. In the window that opens, go to the General tab, and in the Network attached storage systems
connection settings section enter the name of the user account under which the task starts, the account
password, and the password confirmation.
5. Click OK.
The modified settings to run the task with user account permissions are saved.
In this section
Adding an RPC network storage to Kaspersky Security for Windows Server ............................................. 40
Disabling and enabling protection of an added RPC network storage ........................................................ 40
Removing an RPC network storage from the protection scope .................................................................. 41
► To add an RPC network storage to the protection scope of Kaspersky Security for Windows Server:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the window that opens, click the Add button.
The Add protection scope window opens.
5. In the Add protection scope window, enter the domain name or IP address of the network
attached storage.
If you are using a NetApp storage system managed by NetApp Clustered Data ONTAP operating
system, fill in this field by specifying the IP address of the computer on which the connector
application is installed, i.e. 127.0.0.1.
6. Click OK to add the network attached storage to Kaspersky Security for Windows Server.
The network attached storage appears in the list of protected network attached storages.
7. Click the Save button.
The configured protection scope settings are saved.
Kaspersky Security for Windows Server connects to the network attached storage when the RPC Network Storage
Protection task is launched. If you have specified an incorrect domain name or incorrect IP address for the network
attached storage, the task returns an error. Kaspersky Security for Windows Server records information about this
event in the system audit log and the task log.
If you are using a NetApp storage system managed by the NetApp Clustered Data ONTAP operating
system, Kaspersky Security for Windows Server connects to the connector application installed
on the protected server. You are recommended to make sure that the connection between the connector
application and the NetApp storage system is configured correctly and that the added network attached
storage is protected by Kaspersky Security for Windows Server.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the list of protected network attached storages, clear the check box next to the name of the network
attached storage for which you want to temporarily disable protection.
5. Click the Save button.
If you disable the protection feature for all added network attached storages, Kaspersky Security for Windows
Server stops the RPC Network Storage Protection task.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the list of protected network attached storages, select the check box next to the name of the network
attached storage for which you want to enable protection.
5. Click the Save button.
If RPC Network Storage Protection is enabled, Kaspersky Security for Windows Server establishes
a connection to the network attached storage. If the RPC Network Storage Protection task is not running, you
need to start it so that Kaspersky Security for Windows Server establishes a connection with the network
attached storage.
► To delete an RPC network storage from the RPC Network Storage Protection task:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the list of protected network attached storages, select the network attached storage that you want
to remove from the protection scope.
5. In the context menu of the name or IP address of the network attached storage that you want to remove
from the protection scope, select Remove from the list.
The selected network attached storage is removed from the list of protected network attached storages.
When task settings are modified (for example, a different protection scope is specified), Kaspersky Security for
Windows Server immediately applies new settings in the running task. Kaspersky Security for Windows Server logs
the date and time when task settings were modified in the system audit log.
Protection scope Not available. You need to add the network attached
storage to Kaspersky Security for
Windows Server.
Security level The Recommended security level You can apply one of the preset security
is applied. levels to the protected network attached
storage, or specify the values
of the security settings manually.
Heuristic Analyzer The Medium analysis level is applied. The Heuristic Analyzer can be enabled or
disabled and the analysis level configured.
Trusted zone Applied. You can enable and disable the use
of the trusted zone and configure it.
KSN Usage Applied. You can enable or disable the use of KSN
services in the RPC Network Storage
Protection task.
Network storage The User name and the Password You need to specify the user account
connection of the user account under which the task under which the RPC Network Storage
settings is started: none; Protection task is started. You can also
Timeout between reconnection attempts modify other network storage connection
(sec.) : 5; settings.
Maximum number of reconnection
attempts: 3;
Clear cache of scanned files
on network attached storage
after application database update
check box is cleared.
Scheduled task Not applied. The Run by schedule check You can configure the task to run
launch box is cleared. The task is run manually. by schedule, for example at Kaspersky
Security for Windows Server start.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. On the General tab in the window that opens, configure the following task settings:
Using the Heuristic Analyzer (on page 43).
Task launch with user account permissions (see Section "Selecting a user account for running the RPC
Network Storage Protection task" on page 39).
Connection to an PRC network storage (see Section "Configuring general settings for RPC Network
Storage connection" on page 45).
Integration with other Kaspersky Security for Windows Server components (see Section "Preparing
for launch of the Network Attached Storage Protection task" on page 21).
► To configure the settings of heuristic analyzer used in the ICAP Network Storage Protection task:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. In the window that opens, go to the General tab and do the following in the Heuristic analyzer section:
Clear or select the Use heuristic analyzer check box.
If necessary, adjust the level of analysis using the slider.
The slider allows you to adjust the heuristic analysis level. The scanning intensity level
sets the balance between the thoroughness of searches for threats, the load
on the operating system's resources and the time required for scanning.
The following scanning intensity levels are available:
Light. Heuristic analyzer performs fewer operations found inside executable files.
The probability of threat detection in this mode is somewhat lower. Scanning is faster
Trusted zone
KSN Usage task
Trusted zone is a predefined list of exclusions for protection scope or scan scope.
You can enable or disable the use of the trusted zone in the RPC Network Storage Protection task.
After the trusted zone is enabled or disabled, exclusions in this zone will be applied or removed immediately.
Kaspersky Security Network (KSN) is an infrastructure of online services providing access to Kaspersky Lab's
online knowledge base on the reputation of files, web resources and programs.
You can enable or disable the KSN usage in the RPC Network Storage Protection task. After you enable or disable
the KSN usage, the task starts or stops showing conclusions about the reputation of files being scanned based
on information received from KSN.
To start the KSN Usage task, you must accept the Kaspersky Security Network Statement.
Detailed information about the trusted zone and the KSN Usage task is provided in the Kaspersky Security for
Windows Server Administrator's Guide.
► To enable or disable the use of other application components in the RPC Network Storage
Protection task:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Properties link.
The Task settings window opens.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. In the window that opens, go to the General tab and do the following in the Network attached storage
systems connection settings section:
Enter a value for the timeout between attempts to recover the connection with the network
attached storage.
Enter a value for the maximum number of attempts to recover the connection with the network
attached storage.
If you want Kaspersky Security for Windows Server to clear the cache of scanned files of the network
attached storage after each update of the application databases, select the Clear cache of scanned
files on network attached storage after application database update check box.
Maximum performance
The Maximum performance security level is recommended if, apart from using Kaspersky Security for Windows
Server on servers and workstations, there are additional computer security measures on your network,
for example, firewalls are set up, network users comply with existing security policies.
Recommended
The Recommended security level ensures an optimum combination of protection quality and degree of impact
on the performance of protected servers. This level is recommended by Kaspersky Lab experts as sufficient
for protection of file servers on most corporate networks. The Recommended security level is set by default.
Maximum Protection
The Maximum protection security level is recommended if you have higher requirements for computer security
on your organization's network.
Action to perform Block access and Block access and Block access and
on infected objects disinfect. Delete if perform recommended disinfect. Delete if
disinfection fails action disinfection fails
Action to perform Block access and Block access and Block access and
on probably infected quarantine perform recommended quarantine
objects action
Actions depending No No No
on the detected object type
Exclude files No No No
Do not detect No No No
Stop scanning if it takes 60 60 60
longer than (sec.)
Do not scan compound 8 8 No
objects larger than (MB)
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the list of protected network attached storages, select the network attached storage for which you want
to select a preset security level.
5. On the Security level tab, select one of the following preset security levels in the list:
Maximum Protection
Recommended
Maximum performance
You can also configure the security settings for a protected network attached storage manually (see Section
"Manually configuring the security level settings in the RPC Network Storage Protection task" on page 48).
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane of the RPC Network Storage Protection node, click the Configure protection
scope link.
4. In the list of protected network attached storages, select the network attached storage whose security
settings you want to configure.
5. Configure the settings of the selected network attached storage in accordance with your computer security
requirements. To do this, perform the following actions:
On the General tab take the following actions:
In the Objects protection section, specify objects to be scanned by Kaspersky Security for
Windows Server:
All objects.
Kaspersky Security for Windows Server scans all objects.
Objects scanned by format.
Kaspersky Security for Windows Server scans only infectable objects based
on file format.
Kaspersky Lab compiles the list of formats. It is included in the Kaspersky Security for
Windows Server databases.
Objects scanned according to list of extensions specified in anti-virus database.
Kaspersky Security for Windows Server scans only infectable objects based
on file extension.
Kaspersky Lab compiles the list of extensions. It is included in the Kaspersky Security for
Windows Server databases.
This setting can be also configured in the network attached storage. If the setting is configured
in Kaspersky Security for Windows Server, the network attached storage sends the object
for scanning, and Kaspersky Security for Windows Server declares the object safe without running
a virus scan. If the setting is configured in the network attached storage, the network attached
storage does not send the object for scanning. To reduce network traffic and the load
on the server with Kaspersky Security for Windows Server installed, it is recommended
to configure settings that limit the number of objects scanned in the network attached storage.
If you are using a network attached storage under the Clustered Data ONTAP operating
system, this setting can be also configured in the network attached storage. If the setting
is configured in Kaspersky Security for Windows Server, the network attached storage sends
the object for scanning, and Kaspersky Security for Windows Server declares the object safe
without running a virus scan. If the setting is configured in the network attached storage,
the network attached storage does not send the object for scanning. To reduce network traffic
and the load on the server with Kaspersky Security for Windows Server installed, it
is recommended to configure settings that limit the number of objects scanned in the network
attached storage.
► To manually save the security settings of a node and save those settings to a template:
1. In the Application Console tree, select the task for which you want to save the security settings
to a template.
2. In the details pane of the selected task, click the Configure protection scope or Configure scan
scope link.
3. In the tree or in the list of the server's network file resources, select the template that you want to view.
4. On the Security level tab click the Save as template button.
The Template properties window opens.
5. In the Template name field, enter the name of the template.
6. Enter additional template information in the Description field.
7. Click OK.
The template with the set of security settings is saved.
You also can create a settings template for On-Demand Scan tasks from the details pane of the On-Demand
Scan parent node.
Security settings from a template applied to a parent node in the server file resource tree are installed in all
child nodes.
If the protection scope or scan scope of the child nodes in the server file resource tree was configured separately,
the security settings from the template applied to the parent node are not set automatically for such child nodes.
1. In the Application Console tree, select the task for which you want to save the security settings
to a template.
2. In the details pane of the selected task, click the Configure protection scope or Configure scan
scope link.
3. In the tree or in the list of the server's network file resources select the node for which you want to apply
the template.
4. Select Apply template > <Template name>.
5. In the Application Console tree, open the context menu of the configurable task.
6. Select Save task.
The security settings template is applied to the parent and all child nodes in the server file resource tree.
The Security level tab of the selected node will now have the value Custom.
► To view security settings in a template that you have created, perform the following steps:
1. In the Application Console tree, select the task for which you want to view the security template.
2. In the context menu of the selected task, select Settings templates.
You can create a settings template for On-Demand Scan tasks from the details pane of the On-
Demand Scan parent node.
1. In the Application Console tree, select the task for which you no longer want to use a security settings
template for configuration.
2. In the context menu of the selected task, select Settings templates.
You can create a settings template for On-Demand Scan tasks from the details pane of the On-
Demand Scan parent node.
If the security settings template was applied to protect or to scan nodes of server file resources, the configured
security settings for such nodes are preserved after the template is deleted.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the RPC Network Storage Protection child node.
3. In the details pane, select the Overview and management tab.
The Statistics section shows a table with information about objects processed by Kaspersky Security for
Windows Server since it was started until the current moment (see the table below).
Objects not moved The number of objects that Kaspersky Security for Windows Server
to quarantine attempted to quarantine but was unable to do so, for example, due
to insufficient disk space.
Objects not removed The number of objects that Kaspersky Security for Windows Server
attempted but was unable to delete, because, for example, access
to the object was blocked by another application.
Objects not scanned The number of objects in the protection scope that Kaspersky Security for
Windows Server failed to scan because, for example, access to the object
was blocked by another application.
Objects not backed up The number of objects the copies of which Kaspersky Security for Windows
Server attempted to save in Backup but was unable to do so, for example,
due to insufficient disk space.
Processing errors Number of objects whose processing resulted in an error.
Objects disinfected Number of objects disinfected by Kaspersky Security for Windows Server.
Moved to quarantine Number of objects quarantined by Kaspersky Security for Windows Server.
Moved to Backup The number of object copies that Kaspersky Security for Windows Server
saved to Backup.
Objects removed Number of objects deleted by Kaspersky Security for Windows Server.
Password-protected Number of objects (archives, for example) that Kaspersky Security for
objects Windows Server missed because they were password protected.
Corrupted objects The number of objects skipped by Kaspersky Security for Windows Server as
their format was corrupted.
Objects processed Total number of objects processed by Kaspersky Security for Windows
Server.
In this chapter
About the ICAP Network Storage Protection ............................................................................................... 54
Configuring a connection between an ICAP network storage and Kaspersky Security for Windows
Server .......................................................................................................................................................... 55
Configuring the ICAP Network Storage Protection task .............................................................................. 56
Security levels in the ICAP Network Storage Protection task ..................................................................... 59
Viewing statistics of the ICAP Network Storage Protection task ................................................................. 62
Kaspersky Security for Windows Server has no direct access to files in an ICAP network storage (hereinafter also
referred to as network attached storage). When an attempt is made to read or write to a file, the network attached
storage generates an ICAP request to Kaspersky Security for Windows Server and sends the file inside this
request. The application performs an anti-virus scan of this file in accordance with the settings defined in the ICAP
Network Storage Protection task. When a threat is detected, Kaspersky Security for Windows Server performs
the actions defined in the task settings on the file, and then it sends the scan result to the network attached
storage. If the Disinfect action is specified in the task settings, and the file is successfully disinfected, Kaspersky
Security for Windows Server returns the disinfected file to the network attached storage as the response
to the request.
Kaspersky Security for Windows Server allows you to configure the actions that the application will perform
on infected and probably infected files.
When using KSN in the ICAP Network Storage Protection task, Kaspersky Security for Windows Server
cannot delete or block files used by an ICAP network storage because the application has no direct access
to network folders of the storage system when an untrusted conclusion is received from KSN services.
Information about receiving an untrusted conclusion is recorded in the KSN Usage task log.
You can protect one network attached storage using one server with Kaspersky Security for Windows Server
installed. To improve the performance of the network attached storage and the server with Kaspersky Security for
Windows Server, you can use several servers with Kaspersky Security for Windows Server for protection
of a single network attached storage. In this case, the network attached storage distributes the workload among
associated servers on which Kaspersky Security for Windows Server is installed.
The ICAP Network Storage Protection task is created by default; it is a system task of Kaspersky Security for
Windows Server. You cannot delete or rename this task. You cannot create custom tasks for ICAP Network
Storage Protection. You can configure the ICAP Network Storage Protection task.
The ICAP Network Storage Protection component is available within Kaspersky Security for Windows Server
for network attached storages.
For more details on solutions for protection of organizations that include Kaspersky Security for Windows
Server, see the Administrator's Guide of Kaspersky Security for Windows Server.
You can run Network Attached Storage Protection tasks if the active key supports network attached storage
protection. If you run a Network Attached Storage Protection task when the active key does not support
network attached storage protection, the task returns an error. In this case, Kaspersky Security for Windows
Server does not protect network attached storages.
To protect an ICAP network storage, you need to configure the connection of the network attached storage
to Kaspersky Security for Windows Server.
► To configure a connection between a network attached storage and Kaspersky Security for Windows
Server:
1. Configure the following settings on the server with Kaspersky Security for Windows Server installed:
In Application Console, specify the settings of the connection to an ICAP network storage (see Section
"Configuring the settings of the connection to an ICAP network storage" on page 57) to be protected
by Kaspersky Security for Windows Server.
In the local group policy editor, configure the security settings of local policies (see Section
"Configuring security settings of local policies in the local group policy editor" on page 21).
In the Windows firewall settings window, configure the rules of outbound and inbound connections
in Windows firewall (see Section "Configuring inbound and outbound connections in Windows firewall"
on page 22).
2. In the network attached storage, configure the following settings:
Enable anti-virus protection.
Specify the address of the connection to Kaspersky Security for Windows Server in the network
attached storage settings.
The connection between an ICAP network storage and Kaspersky Security for Windows Server is established.
When the task settings are modified (for example, a different security level is specified), Kaspersky Security for
Windows Server immediately applies the new settings in the running task. Kaspersky Security for Windows Server
logs the date and time when task settings were modified in the system audit log.
Security level The Recommended You can apply one of the preset security levels
security level is applied. to the protected network attached storage, or
specify the values of the security settings
manually.
Heuristic analyzer The Medium analysis level The Heuristic Analyzer can be enabled or disabled
is applied. and the analysis level configured.
Using KSN Applied. You can enable or disable the use of KSN services
for protection for ICAP Network Storage Protection.
Network storage Network port number You can also modify other network storage
connection settings – 1344. connection settings. These changes should
Service ID – avscan. be incorporated on the network attached storages.
Scheduled task launch Not applied. The Run You can configure the task to run by schedule,
by schedule check box for example at Kaspersky Security for Windows
is cleared. The task is run Server startup.
manually.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the ICAP Network Storage Protection child node.
3. In the details pane of the ICAP Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. On the General tab in the window that opens, configure the following task settings:
Connection to an ICAP network storage (see Section "Configuring the settings of the connection
to an ICAP network storage" on page 57).
Using the Heuristic Analyzer (on page 58).
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the ICAP Network Storage Protection child node.
3. In the details pane of the ICAP Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. On the General tab in the fields of the Connection settings section specify the following settings:
Network port number
The number of the ICAP server network port used to connect the network attached
storage to the application.
Service ID.
An ID that makes part of the RESPMOD URI parameter of ICAP (see document RFC
3507). RESPMOD URI designates the address of an anti-virus ICAP server installed
for the network storage area.
For example, if the IP address of the protected server is 192.168.10.10, the port number
is 1344, and the ID of ICAP service is avscan, those parameters result in the following
RESPMOD URI address – icap://192.168.10.10/avscan:1344.
5. Click OK.
The newly configured settings are saved.
Once you have configured the connection settings, on the network attached storage you need to set the address
of the connection to Kaspersky Security for Windows Server. The connection settings are included in this address.
For example, if the default settings are used, the connection address looks as follows:
► To configure the settings of Heuristic Analyzer used in the ICAP Network Storage Protection task:
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the ICAP Network Storage Protection child node.
3. In the details pane of the ICAP Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. In the window that opens, go to the General tab and do the following in the Heuristic analyzer section:
Clear or select the Use heuristic analyzer check box.
If necessary, adjust the level of analysis using the slider.
The slider allows you to adjust the heuristic analysis level. The scanning intensity level
sets the balance between the thoroughness of searches for threats, the load
on the operating system's resources and the time required for scanning.
The following scanning intensity levels are available:
Light. Heuristic analyzer performs fewer operations found inside executable files.
The probability of threat detection in this mode is somewhat lower. Scanning is faster
and less resource-intensive.
Medium. Heuristic Analyzer performs the number of instructions found within
executable files recommended by the experts of Kaspersky Lab.
This level is selected by default.
Deep. Heuristic analyzer performs more operations found in executable files.
The probability of threat detection in this mode is higher. The scan uses up more
system resources, takes more time, and can cause a higher number of false alarms.
The slider is available if the Use Heuristic Analyzer check box is selected.
5. Click OK.
The newly configured settings are applied.
You can enable or disable the KSN usage in the RPC Network Storage Protection task. After you enable or disable
the KSN usage, the task starts or stops showing conclusions about the reputation of files being scanned based
on information received from KSN.
To start the KSN Usage task, you must accept the KSN Statement. The KSN Usage task does not start
automatically at start of Kaspersky Security for Windows Server by default.
Detailed information about the KSN Usage task is provided in the Kaspersky Security for Windows Server
Administrator's Guide.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the ICAP Network Storage Protection child node.
3. In the details pane of the ICAP Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. In the window that opens, go to the General tab and in the KSN usage section clear or select the Use KSN
for protection check box.
The check box enables or disables the use of Kaspersky Security Network (KSN)
services in the ICAP Network Storage Protection task.
If the check box is selected, the application uses Kaspersky Security Network data
to ensure a faster response time by the application to new threats and reduces
the likelihood of false positives.
If the check box is cleared, the ICAP Network Storage Protection task does not use
KSN services.
The check box is selected by default.
5. Click OK.
The newly configured settings are saved.
Maximum performance
The Maximum performance security level is recommended if, apart from using Kaspersky Security for Windows
Server on servers and workstations, there are additional computer security measures on your network,
for example, firewalls are set up, network users comply with existing security policies.
Recommended
The Recommended security level ensures an optimum combination of protection quality and degree of impact
on the performance of protected servers. This level is recommended by Kaspersky Lab experts as sufficient
for protection of file servers on most corporate networks. The Recommended security level is set by default.
Maximum Protection
The Maximum protection security level is recommended if you have higher requirements for computer security
on your organization's network.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
2. Select the ICAP Network Storage Protection child node.
3. In the details pane of the ICAP Network Storage Protection node, click the Properties link.
The Task settings window opens.
4. On the General tab, in the Security level section, select one of the following preset security levels
in the list:
Maximum Protection
Recommended
Maximum performance
The main values of the settings of the selected security level are displayed under the list.
5. Click OK.
1. Expand the Network Attached Storage Protection node in the Application Console tree.
Objects not moved The number of objects that Kaspersky Security for Windows Server
to quarantine attempted to quarantine but was unable to do so, for example, due
to insufficient disk space.
Objects not removed The number of objects that Kaspersky Security for Windows Server
attempted but was unable to delete, because, for example, access
to the object was blocked by another application.
Objects not scanned The number of objects in the protection scope that Kaspersky Security
for Windows Server failed to scan because, for example, access
to the object was blocked by another application.
Objects not backed up The number of objects the copies of which Kaspersky Security for
Windows Server attempted to save in Backup but was unable to do so,
for example, due to insufficient disk space.
Processing errors Number of objects whose processing resulted in an error.
Objects disinfected Number of objects disinfected by Kaspersky Security for Windows
Server.
Moved to quarantine Number of objects quarantined by Kaspersky Security for Windows
Server.
Moved to Backup The number of object copies that Kaspersky Security for Windows Server
saved to Backup.
Objects removed Number of objects deleted by Kaspersky Security for Windows Server.
Password-protected objects Number of objects (archives, for example) that Kaspersky Security for
Windows Server missed because they were password protected.
Corrupted objects The number of objects skipped by Kaspersky Security for Windows
Server as their format was corrupted.
Objects processed Total number of objects processed by Kaspersky Security for Windows
Server.
In this section
About the Anti-Cryptor for NetApp ............................................................................................................... 65
Creating and configuring FPolicy ................................................................................................................. 66
Configuring the Kaspersky Security for Windows Server ............................................................................ 68
Configuring Anti-Cryptor for NetApp task settings ....................................................................................... 70
To operate on network attached storage, Kaspersky Security for Windows Server must to be connected
to a protected storage as an external engine. The connection implies receiving notifications about file operations
that have been performed on a protected network attached storage by the external engine; analyzing the patterns
on the file operations received and sending conclusions about the file activity (whether it can be estimated as
an encryption attempt or not); blocking the compromised hosts. In order to start the Anti-Cryptor for NetApp task
the server (with Kaspersky Security for Windows Server installed) must be specified as the primary FPolicy server
on the network attached storage side. FPolicy is a file access notification framework that is used to monitor and
manage file access events on Storage Virtual Machines (SVMs) with FlexVol volumes. The framework generates
notifications that are sent to external FPolicy servers.
The Fpolicy is not supported for FlexGroup volumes, hence the Anti-Cryptor for NetApp component cannot
be configured to protect the network attached storages with FlexGroup volumes.
Notifications from network attached storage to an external server are sent via the FPolicy protocol, only
in a synchronous mode. The server analyzes each notification before allowing a file operation.
The external engine (Kaspersky Security for Windows Server) and a protected network attached storage
are connected using the FPolicy protocol.
1. Create and configure the FPolicy on the protected network attached storage side.
2. Specify Kaspersky Security for Windows Server as an FPolicy server on a protected network attached
storage side. Kaspersky Security for Windows Server will be recognized as an external server.
3. Configure the Anti-Cryptor for NetApp task settings in Kaspersky Security for Windows Server.
To complete the required configuration you need the following data:
For detailed instructions on how to create the FPolicy please see the following article:
https://library.netapp.com/ecmdocs/ECMP12454941/html/GUID-DDFB957B-CE0F-4603-9629-669653B1E922.html.
_EVENT CREATE Vserver name <svm_name> Must coincide with the value
specified in the Anti-Cryptor
for NetApp task settings
This parameter identifies the file
on the external engine side
operations that will be intercepted
(Kaspersky Security for
and reported to Kaspersky
Windows Server).
Security for Windows Server
for analysis and detection
Event <events_source> Will be used as a source
encryption attempts.
for the FPolicy.
Protocol cifs
File operations create, open, rename,
write, close, setattr,
delete
Filters close-with-modification,
first-write, write-with-
size-change, open-
with-delete-intent,
open-with-write-intent
Is volume false
operation
required
Is passthrough false
read enabled
_SCOPE CREATE Vserver name <svm_name> We recommend that you
specify the widest
Policy <fpolicy_name>
possible area
This parameter determines
for protecting the network
the protection scope covered
attached storage. We
by the external engine.
recommend that you add
exclusions in the Anti-
Cryptor for NetApp
task settings.
We recommend that you specify the highlighted values in the table. Other values may vary depending on your
requirements.
If FPolicy settings are changed on the network attached storage while the Anti-Cryptor for NetApp task
is running, the Anti-Cryptor for NetApp task must be restarted to apply the new settings.
Heuristic Analyzer Light – Medium – Deep Applied with the “medium” heuristic
level.
Exclusions Applied for all protected shares. Not defined
Exclusion criteria:
Mask (folder, object, extension)
Client computer IP address
Trusted user
By default Kaspersky Security for Windows Server automatically unblocks hosts in 30 minutes after they
were added to the list. Computers' access to network file resources is restored automatically after they are deleted
from the list of untrusted hosts.
When configuring the Anti-Cryptor for NetApp task, please pay attention to the external engine type that
is used in the FPolicy settings (_ENGINE CREATE parameter).
Kaspersky Security for Windows Server logs the event with the result of received conclusion and performs
an action according to the task mode.
See detailed information on how to configure the Blocked Hosts Storage in the Kaspersky Security for
Windows Server Administrator's Guide.
1. In the Application Console tree, expand the Network Attached Storage Protection node.
2. Select the Anti-Cryptor for NetApp child node.
3. Click the Properties link in the details pane.
The Task settings window opens.
► To set up the exclusion list for the Anti-Cryptor for NetApp task:
1. In the Application Console tree, expand the Network Attached Storage Protection node.
2. Select the Anti-Cryptor for NetApp child node.
3. Click the Exclusion list link in the details pane.
The Exclusion list window opens.
4. Set up the exclusion list (see Section "Modifying the list of exclusions" on page 73).
1. Expand the Managed devices node in the Kaspersky Security Center Administration Console tree and
select the administration group for which you want to configure application settings.
2. To configure application settings for a group of servers, select the Policies tab and open the properties
of the policy you want to configure.
3. In the Network Attached Storage Protection section click the Settings button the Anti-Cryptor
for NetApp block.
4. On the General tab, configure the task mode and the heuristic analyzer.
5. On the Addressing tab, configure connection and authentication settings (see Section "Configuring
addressing" on page 72).
6. On the Exclusions tab, add exclusions from the protection scope (see Section "Modifying the list
of exclusions" on page 73).
7. On the Task Management tab, start the task based on a schedule.
8. Click OK.
Configuring addressing
► To set up a connection with protected clusters and gain access to network attached storage:
1. Open the Addressing tab in the task settings.
2. In the Connection section configure the following:
IP address of protected cluster
This account should coincide with the account that has been defined during _POLICY CREATE
operation on network attached storage side.
Path
IP address
User ID
You can use any combination of these criteria for exclusion. The more criteria are specified, the more strict
the exclusion parameters are. Kaspersky Security for Windows Server does not analyze file operations for specified
exclusions. Note that exclusions added to this list are used for all folders on network attached storage.
If you simultaneously configure anti-virus protection and FPolicy on the same network attached storage,
access to the storage shared folders will be possible only if the RPC Network Storage Protection and Anti-
Cryptor for NetApp tasks are running.
In this chapter
About Network Attached Storage Protection from Kaspersky Security Center ........................................... 75
Configuring Network Attached Storage Protection settings using policies .................................................. 75
Configuring Network Attached Storage Protection settings for one server in Kaspersky Security Center . 77
Using Kaspersky Security Center policies. You can configure common Network Attached Storage
Protection settings and apply them to tasks for the selected server group.
In the Application settings window. You can configure Network Attached Storage Protection settings
separately for each server where Kaspersky Security for Windows Server is installed.
Managing Network Attached Storage Protection tasks from Kaspersky Security Center
75
Table 12. Network Attached Storage Protection tasks settings in the Kaspersky Security
Center policies
Network Attached Storage Options
Protection task
RPC Network Storage In the RPC Network Storage Protection section, click the Settings
Protection button to configure the following task settings:
Specify the protection scope.
Set the security level for the selected protection scope: you can select
a predefined security level or configure the security settings manually.
Configure the use of Heuristic Analyzer.
Configure usage of the Trusted zone and KSN.
Configure the network attached storage connection settings.
Configure the task run settings.
ICAP Network Storage In the ICAP Network Storage Protection section, click the Settings
Protection button to configure the following task settings:
Configure the use of Heuristic Analyzer.
Configure the network attached storage connection settings.
Set the security level for the selected protection scope: you can select
a predefined security level or configure the security settings manually.
Configure the use of KSN.
Configure the task run settings.
Anti-Cryptor for NetApp In the Anti-Cryptor for NetApp section, you can click the Settings button
to configure the following settings:
Task mode.
Heuristic analyzer usage.
Connection and authentication settings.
Specify exclusions from the protection scope.
► To configure settings of the Network Attached Storage Protection task in the Kaspersky Security
Center policy:
1. Expand the Managed devices node in the Kaspersky Security Center Administration Console tree and
select the administration group for which you want to configure application settings.
2. Perform one of the following actions in the details pane of the selected administration group:
To configure application settings for a group of servers select a policy you want to configure and open
the Properties: <Policy name> window using one of the following ways:
a. By selecting the Properties option in the policy context menu.
b. By clicking the Configure policy link in the right details pane of the selected policy.
c. By double-clicking the selected policy.
To configure the application for a single server:
a. On the Devices tab open the Properties: <Computer name> window in one
of the following ways:
Double-click the name of the protected server.
Open the context menu of the protected server name and select the Properties item.
Managing Network Attached Storage Protection tasks from Kaspersky Security Center
76
The Properties: <Computer name> window opens.
b. In the Tasks section select a task you want to configure.
3. When configuring a policy, select Network Attached Storage Protection in the list of sections
in the Properties: <Policy name> window.
4. In the window that opens, perform the following operations:
To configure settings of the RPC Network Storage Protection task, in the RPC Network Storage
Protection section click the Settings button.
In the Options window that opens, configure the task settings according to your requirements. Click
OK to save changes made to the settings in the policy.
To configure settings of the ICAP Network Storage Protection task, in the ICAP Network Storage
Protection section click the Settings button.
In the Options window that opens, configure the task settings (see Section "Configuring the ICAP
Network Storage Protection task" on page 56) according to your requirements. Click OK to save
changes made to the settings in the policy.
To configure settings of the Anti-Cryptor for NetApp task, in the Anti-Cryptor for NetApp section click
the Settings button.
In the Options window that opens, configure the task settings (see Section "Configuring Anti-Cryptor
for NetApp task settings" on page 70) according to your requirements. Click OK to save changes made
to the settings in the policy.
5. In the Properties: <Policy name> window, click OK.
The configured settings of the Network Attached Storage Protection tasks are saved and applied
to the active policy.
Detailed information about the operation of Kaspersky Security for Windows Server with Kaspersky Security
Center policies and information about Kaspersky Security Center policies is provided in the Kaspersky
Security Center Administrator's Guide and Kaspersky Security for Windows Server Administrator's Guide.
1. Expand the Managed Devices node in the Administration Console tree and select the group that
the protected server belongs to.
2. In the details pane, on the Devices tab open the context menu on the line with information about
the protected server and select Properties.
Managing Network Attached Storage Protection tasks from Kaspersky Security Center
77
3. In the Properties: <Computer name> window of the Tasks section, open the context menu
of the Network Attached Storage Protection task that you want to configure and select the Properties item.
4. In the window that opens, configure the settings of the Network Attached Storage Protection task according
to your requirements:
RPC Network Storage Protection task (see Section "Configuring the RPC Network Storage Protection
task" on page 41).
ICAP Network Storage Protection task.
5. Click OK.
The configured task settings are saved and applied to the running task for one server.
If an application is covered by a Kaspersky Security Center policy and this policy prohibits changing the task
settings, these settings cannot be edited via the Properties: <Computer name> window.
Detailed information about the operation of Kaspersky Security for Windows Server with Kaspersky Security
Center policies and information about Kaspersky Security Center policies is provided in the Kaspersky
Security Center Administrator's Guide and Kaspersky Security for Windows Server Administrator's Guide.
Managing Network Attached Storage Protection tasks from Kaspersky Security Center
78
Contacting Technical Support
This section describes the ways to receive technical support and the conditions on which it is available.
In this chapter
How to get technical support ....................................................................................................................... 79
Technical Support via Kaspersky CompanyAccount ................................................................................... 79
Using trace files and AVZ scripts ................................................................................................................. 80
Technical support is available only to users who have purchased a commercial license for the application.
Technical support is not available to users who have a trial license.
Before contacting Technical Support, please read through the Technical Support rules.
You can register all of your organization's employees under a single user account on Kaspersky CompanyAccount.
A single account lets you centrally manage electronic requests from registered employees to Kaspersky Lab and
also manage the privileges of these employees via Kaspersky CompanyAccount.
English
Spanish
Italian
German
After analyzing the data you send, Kaspersky Lab Technical Support specialists can create an AVZ script and send
it to you. With AVZ scripts, it is possible to analyze active processes for threats, scan the computer for threats,
disinfect or delete infected files, and create system scan reports.
For more effective support and troubleshooting of application problems, Technical Support specialists may ask you
to change application settings temporarily for purposes of debugging during diagnostics. This may require doing
the following:
Activating the functionality that processes and stores extended diagnostic information.
Fine-tuning the settings of individual software components, which are not available via standard user
interface elements.
Changing the settings of storage and transmission of diagnostic information that was processed.
Configuring the interception and logging of network traffic.
In 2008, Kaspersky Lab was rated among the world’s top four leading vendors of information security software
solutions for end users (IDC Worldwide Endpoint Security Revenue by Vendor). Kaspersky Lab is the preferred
vendor of computer protection systems for home users in Russia (IDC Endpoint Tracker 2014).
Kaspersky Lab was founded in Russia in 1997. It has since grown into an international group of companies with 38
offices in 33 countries. The company employs more than 3,000 skilled professionals.
Products. Kaspersky Lab products provide protection for all systems, from home computers to large
corporate networks.
The personal product range includes security applications for desktop, laptop, and tablet computers, smartphones
and other mobile devices.
The company offers protection and control solutions and technologies for workstations and mobile devices, virtual
machines, file and web servers, mail gateways, and firewalls. The company's portfolio also features specialized
products providing protection against DDoS attacks, protection for industrial control systems, and prevention
of financial fraud. Used in conjunction with centralized management tools, these solutions ensure effective
automated protection for companies and organizations of any size against computer threats. Kaspersky Lab
products are certified by major test laboratories, compatible with software from diverse vendors, and optimized
to run on many hardware platforms.
Kaspersky Lab virus analysts work around the clock. Every day they uncover hundreds of thousands of new
computer threats, create tools to detect and disinfect them, and include their signatures in databases used
by Kaspersky Lab applications.
Technologies. Many technologies that are now part and parcel of modern anti-virus tools were originally
developed by Kaspersky Lab. It is no coincidence that many other developers use the Kaspersky Anti-Virus engine
in their products, including: Alcatel-Lucent, Alt-N, Asus, BAE Systems, Blue Coat, Check Point, Cisco Meraki,
Clearswift, D-Link, Facebook, General Dynamics, H3C, Juniper Networks, Lenovo, Microsoft, NETGEAR,
Openwave Messaging, Parallels, Qualcomm, Samsung, Stormshield, Toshiba, Trustwave, Vertu, and ZyXEL. Many
of the company’s innovative technologies are patented.
Achievements. Over the years, Kaspersky Lab has won hundreds of awards for its services in combating
computer threats. Following tests and research conducted by the reputed Austrian test laboratory AV-Comparatives
in 2014, Kaspersky Lab ranked among the top two vendors by the number of Advanced+ certificates earned and
was ultimately awarded the Top Rated certificate. But Kaspersky Lab's main achievement is the loyalty of its users
worldwide. The company’s products and technologies protect more than 400 million users, and its corporate clients
number more than 270,000.
AO Kaspersky Lab
81
Information about third-party code
Information about third-party code is contained in the file legal_notices.txt, in the application installation folder.
Citrix, XenApp, and XenDesktop are trademarks of Citrix Systems, Inc. and/or one or more of its subsidiaries, and
may be registered in the United States Patent and Trademark Office and in other countries.
EMC, Celerra, Isilon, OneFS, and VNX are either registered trademarks or trademarks of EMC Corporation
in the United States and/or other countries.
IBM and System Storage are trademarks of International Business Machines Corporation, registered in many
jurisdictions worldwide.
Microsoft, Excel, Hyper-V, Windows, Windows Server, and Windows Vista are registered trademarks of Microsoft
Corporation in the United States and other countries.
NetApp and Data ONTAP are trademarks or registered trademarks of NetApp, Inc. in the United States and/or
other countries.
Trademark notices
83
Glossary
A
Administration Server
A component of Kaspersky Security Center that centrally stores information about all Kaspersky Lab applications
that are installed within the corporate network. It can also be used to manage these applications.
Anti-virus databases
Databases that contain information about computer security threats known to Kaspersky Lab as of when the anti-
virus databases are released. Entries in anti-virus databases allow malicious code to be detected in scanned
objects. Anti-virus databases are created by Kaspersky Lab specialists and updated hourly.
Archive
One or more file(s) packaged into a single file through compression. A dedicated application, called an archiver,
is required for packing and unpacking the data.
B
Backup
A special storage for backup copies of files, which are created before disinfection or deletion is attempted.
E
Event severity
Property of an event encountered during the operation of a Kaspersky Lab application. There are four
severity levels:
Critical event.
Error.
Warning.
Info.
Events of the same type can have different severity levels depending on the situation in which the event occurred.
H
Heuristic analyzer
A technology for detecting threats about which information has not yet been added to Kaspersky Lab databases.
The heuristic analyzer detects objects whose behavior in the operating system may pose a security threat. Objects
detected by the heuristic analyzer are considered to be probably infected. For example, an object may be considered
probably infected if it contains sequences of commands that are typical of malicious objects (open file, write to file).
Glossary
84
I
Infectable file
A file that, due to its structure or format, can be used by criminals as a "container" to store and spread malicious
code. As a rule, these are executable files, with such file extensions as .com, .exe, and .dll. The risk of penetration
of malicious code into such files is quite high.
Infected object
An object of which a portion of code completely matches part of the code of known malware. Kaspersky Lab
does not recommend accessing such objects.
K
Kaspersky Security Network (KSN)
An infrastructure of cloud services that provides access to the Kaspersky Lab database with constantly updated
information about the reputation of files, web resources, and software. Kaspersky Security Network ensures faster
responses by Kaspersky Lab applications to threats, improves the performance of some protection components,
and reduces the likelihood of false positives.
O
OLE object
An object attached to another file or embedded into another file through the use of the Object Linking and
Embedding (OLE) technology. An example of an OLE object is a Microsoft Office Excel® spreadsheet embedded
into a Microsoft Office Word document.
P
Policy
A policy determines the settings of an application and manages the access to configuration of an application
installed on computers within an administration group. An individual policy must be created for each application.
You can create an unlimited number of various policies for applications installed on computers in each
administration group, but only one policy can be applied to each application at a time within
an administration group.
Protection status
Current protection status, which reflects the level of computer security.
Q
Quarantine
The folder to which the Kaspersky Lab application moves probably infected objects that have been detected.
Objects are stored in Quarantine in encrypted form in order to avoid any impact on the computer.
Glossary
85
R
Real-time protection
The application's operating mode under which objects are scanned for the presence of malicious code in real time.
The application intercepts all attempts to open any object (read, write, or execute) and scans the object for threats.
Uninfected objects are passed on to the user; objects containing threats or probably infected objects are processed
according to the task settings (disinfected, deleted or quarantined).
S
Security level
The security level is defined as a pre-configured set of application component settings.
Startup objects
A set of applications needed for the operating system and software that is installed on the computer to start and
operate correctly. These objects are executed every time the operating system is started. There are viruses
capable of infecting such objects specifically, which may lead, for example, to blocking of operating system startup.
U
Update
The procedure of replacing / adding new files (databases or application modules) retrieved from the Kaspersky Lab
update servers.
V
Vulnerability
A flaw in an operating system or an application that may be exploited by malware makers to penetrate
the operating system or application and corrupt its integrity. Presence of a large number of vulnerabilities
in an operating system makes it unreliable, because viruses that penetrate the operating system may cause
disruptions in the operating system itself and in installed applications.
Glossary
86
Index
A
Application interface ................................................................................................................................... 24
C
Console ....................................................................................................................................................... 24
start....................................................................................................................................................... 23
M
Main window ............................................................................................................................................... 24
Index
87