-
Who's Online 13 Members, 1 Anonymous, 284 Guests (See full list)
-
Forum Statistics
27.1k
Total Topics151.3k
Total Posts -
Member Statistics
Kaspersky Plus
Güvenlik. Performans. Gizlilik. Hepsi kullanımı kolay tek bir uygulamada.
Kaspersky Small Office Security
Küçük ölçekli işletmenizi kolayca koruyun
Kaspersky Password Manager
Parolalarınız ve belgeleriniz her zaman elinizin altında
Kaspersky Small Office Security
Unkomplizierter Schutz für kleine Unternehmen
Premiumversion
Kaspersky Safe Kids
Behalten Sie Ihre Kinder im Auge, auch wenn Sie nicht in der Nähe sind
Kaspersky VPN Secure Connection
Sicher. Privat. Außergewöhnlich schnell. So sollte Internet sein.
Kaspersky Standard
Mejora la protección con el optimizador del rendimiento del dispositivo
Kaspersky Plus
Seguridad. Rendimiento. Privacidad. Todo en una única aplicación fácil de usar.
Kaspersky Small Office Security
Proteja fácilmente su pequeña empresa
Versión premium
Kaspersky Safe Kids
Supervisa a tus hijos, incluso cuando no estés con ellos
Kaspersky Small Office Security
Protégez votre PME sans effort
Kaspersky Plus
Combina recursos de segurança, desempenho e privacidade em um aplicativo
Kaspersky Small Office Security
Proteja a sua pequena empresa sem esforço
Kaspersky Premium
Proteção completa para seus dispositivos, privacidade online e identidade
Versão Premium
Kaspersky Safe Kids
Fique de olho nas crianças, mesmo quando não estiver por perto
Kaspersky VPN Secure Connection
Segura. Privada. Excepcionalmente rápida. Como a internet deveria ser.
Kaspersky Standard
Protezione avanzata con ottimizzazione delle prestazioni dei dispositivi
Kaspersky Small Office Security
Protezione immediata delle piccole aziende
Versione premium
Kaspersky Safe Kids
Accertati che i tuoi figli siano al sicuro, anche quando non sei con loro
Kaspersky Secure Connection
Простое решение для защиты конфиденциальности и безопасности ценных данных
-
Popular Now
-
Forum
-
-
1
Suspicion malware activity
Welcome to Kaspersky Community. Suggestions to new features should be sent via My Kaspersky service to Support, selecting FeedBack option in the form. If You are in Interactive Mode, You may select different actions: https://support.kaspersky.com/help/Kaspersky/Win21.17/en-US/68174.htm -
1
Suspicion malware activity
Hello all, I've started using Kaspersky again after 20 years :s A threat was immediately detected. It seems to be real, but the options I have don't suit me. How can I have more options for the files? I want something like: - Delete - Keep - Send to quarantine ... Basically, I want to decide what to do with the files myself. Is this no longer possible with kaspersky total secyurity? From the alert I received, I only have the option of deleting with or without restarting the computer -
0
Sandbox-debug-report larger than 1Gb fails to download from WebUI [KATA Sandbox]
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials. Problem Description, Symptoms & Impact When downloading large collects (sandbox-debug-report) exceeding 1Gb in size, download suddenly fails above 1Gb (at ~1 05x xxx KB). Diagnostics Reproducible in all browsers, is not bound to download speed, dowloaded part size is roughly 1Gb Workaround & Solution Workaround: download sandbox-debug-report using SCP and CLI, see https://forum.kaspersky.com/topic/how-to-gather-sandbox-debug-report-from-terminal-katakedre-36851/ Solution: From root, add directive uwsgi_max_temp_file_size 0; to the file /etc/nginx/conf.d/sandbox-ram-frontend.conf on sandbox, as follows: /etc/nginx/conf.d/sandbox-ram-frontend.conf location ~ ^/api/(.*) { rewrite ^/api/(.*)$ $1 break; uwsgi_pass ram_backend; uwsgi_read_timeout 900; client_max_body_size 2048m; include uwsgi_params; uwsgi_max_temp_file_size 0; <---add this line } Apply the changes by reloading nginx configuration: nginx -s reload RCA uwsgi built-in temp file size limit of 1Gb is applied unless other limit is specified directly. -
0
在网页-我的卡巴-设备处,给出的提示,怎么处理?
1.Modified firmware found The modified firmware may contain critical security vulnerabilities. Some apps could get additional permissions and send your sensitive data to third parties. The modified firmware could cause an irreversible device malfunction. 找到修改后的固件 修改后的固件可能包含严重的安全漏洞。某些应用可能会获得其他权限,并将您的敏感数据发送给第三方。修改后的固件可能会导致不可逆转的设备故障。 2.Turn off accessibility for unknown apps Accessibility gives an app access to the data that you enter, such as text or web addresses, and gives it access to the keyboard and microphone. For your data security, you are advised to turn off accessibility for unknown apps. 关闭未知应用的辅助功能 辅助功能使应用能够访问您输入的数据(如文本或网址),并允许其访问键盘和麦克风。为了您的数据安全,建议您关闭未知应用程序的可访问性。 怎么在,在设备上本地修复此问题 -
0
How to сreate the certificate from Internal CA and change KATA CN Web UI Certificate [KATA/KEDRE]
Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials. 1. Pre-requisites The file must contain the certificate itself and a private encryption key for the connection. The file must be in PEM format. The application does not support other formats of certificates. If you have prepared a certificate in a different format, you must convert it to the PEM format. The private key length must be 2,048 bits or longer. Please delete all Endpoint Agent host isolation rules. Connection with the isolated hosts and control over them will be lost. 2. Certificate creation and Configuration steps: To create a Certificate Signing Request file using the openssl utility: 1. Prepare a file named sandbox.config with the following contents: [req] default_bits=2048 prompt=no default_md=sha256 req_extensions=req_ext distinguished_name=dn [dn] C=AE ST=North L=Dubai O=ABC LAB OU=IT Security emailAddress=security@abc.lab CN=katacn.abc.lab [req_ext] subjectAltName=@alt_names [alt_names] DNS.1=katacn.abc.lab 2. Create a private RSA key with the PEM extension (without a passphrase): #openssl genrsa -out cn.key 2048 3. Create a Certificate Signing Request using the following command: #openssl req -new -sha256 -key cn.key -out cn.csr -config cn.config 4. Generate the certificate (as Web Server certificate) from Internal CA in Base 64 encoded with certificate chain. Access your internal CA from Domain Controller using https://dc.abc.lab/certsrv and follow the instructions as below screenshots. 5. Get the certificate from the certificate Authority in P7B format 6. Open the certificate, Export in the format of Service/Server/Root (names given for identification only) per the below screenshot. 7. While exporting the certificates, select the encoding as base64 8. Concatenate/Combine the Certificate in one file as below and save it in .CRT format. If you don’t have server certificate then you can add service and root only On TOP - Service Middle - Server Bottom - Root 9. To make a .PEM format you need to have the private key (get from where you have created the CSR) 10. Run the below command using Openssl in Windows or Linux to make it in a .PEM format #openssl pkcs12 -export -in cn.crt -inkey hsotname.key -out cn.p12 #openssl pkcs12 -in cn.p12 -nodes -out cn.pem 11. Once you have the certificate cn.pem format then upload it to the Central Node Web UI as per the below steps. Upload the TLS certificate in the web interface of the PCN or SCN server to which you want to upload the certificate. To upload an independently prepared TLS certificate using the Kaspersky Anti Targeted Attack Platform web interface: Sign in to the Kaspersky Anti Targeted Attack Platform web interface with the administrator In the window of the application web interface, select the Settings section, Certificates subsection. In the Server certificate section, click This opens the file selection window. Select a TLS certificate file to download and click the Open button. This closes the file selection window. Communication with the mail sensors, the Sandbox component, and the Kaspersky Endpoint Agent application is interrupted until reauthorization. The TLS certificate is added to the Kaspersky Anti Targeted Attack Platform 12. After replacing the certificate don't forget to replace it in KES Policy→ Detection and Response → Endpoint Detection and Response (KATA) → Server Connection Settings → Delete existing certificate and Select new Server TLS certificate (not the Add Client certificate). 13. The certificate you specify here needs to be in CRT Format. You can get it by "Downloading" the Certificate from CN → Settings → Certificates → Server certificate and click Export. 14. Open the KATA CN Web UI using the hostname in a new tab/window and verify the certificate. -
2
-
2
-