Jump to content


  • Content Count

  • Joined

  • Last visited

About c0t0d0s0

  • Rank
  1. According to the support site, this build was released on October 2. http://support.kaspersky.com/11524 However, there's no specific link to download this build. The article mentions that "The installation package of Kaspersky Security Center 10 Maintenance Release 1 version 10.1.249 can be downloaded from Kaspersky Lab website" and the link points here: http://www.kaspersky.com/product-updates/security-center . The latest version available there is 10.1.249b which includes patches 'B' and CVE only. Where can I download the build with integrated patch C?
  2. Hello, We have an issue with KAVWksMP4 severely impacting performance one of our business applications. The application is a rather heavyweight Java app that loads off Intranet web server and runs in browser context. When KAV client is running on a workstation, and Web AV or Anti-Spy components are enabled (at least one of them), the start up time of the application slows down from 10 seconds to 2.5 minutes. Whitelisting the URL where the app resides (under Web AV and Anti-Banner) has no effect whatsoever. Only disabling both WebAV and Anti-Spy helps, but obviously we'd like a better solution. Ideas appreciated...
  3. That doesn't seem to be the case. The timeout is still happening with the relevant zone set to "Local Network" or "Internet" with stealth mode unchecked. Setting it to "Trusted" does fix it, but like I indicated earlier, this is not an option. *sigh*
  4. Changing the zone to Trusted in Anti-Hacker effectively allows all network connections through the firewall, doesn't it?
  5. Thanks, but disabling the firewall policy is not an option.
  6. We have a problem with Windows workstations running, where all telnet and ssh sessions time out when they sit idle for longer than 10 minutes. I'm pretty sure the firewall component of KAV is responsible, as this is not happening with Anti-Hacker disabled. Is there a way to increase TCP session timeout in KAV?
  7. We have both Active and Mobile User policies defined. They mostly differ in firewall ruleset, mobile policy being more restrictive. Problem is, that creates a dependency on the management server that must always be up and reachable, which is not always the case. For example, if a WAN link between our main co-lo and a branch office goes down, that triggers a switch to the mobile policy for all clients in that office which breaks windows drive mappings, etc. I'm looking for a way to avoid that. Looks like there is a way to force mobile policy to be on by defining a connection profile, setting up specific rules (subnet match, default gateway match, DNS domain, etc.), and selecting a proper checkbox in the Network Agent policy, however there seems to be no way to force the Active policy to be on based on similar criterea, which strikes me as strange. What am i missing?
  8. Bump. I'm having exactly the same issue with IPs of VPN users not updating in admin kit. Almost 1 year later... is there a better fix for this issue than backup/reinstall/restore?
  9. Scenario: We need to deploy a KAV6 MP4 client to a bunch of people that are full-time remote users and connect to our corporate network using a VPN client. Note that our corporate KAV policy for Windows Workstations has specific exclusions for the VPN client in Trusted Apllications and Packet Filtering section of Anti-Hacker that allow it to work. Problem: After a push install, when a user successfully gets the software and reboots, KAV client starts up with the initial policy that prevents VPN client from working. In order to get the correct corporate policy that has VPN client exclusions defined, a user needs to connect to our network and sync with the administration server, which is not happening with the initial policy. Sort of a catch 22. Is there a way to modify the default policy in the installation package, or make sure that the clients get the proper policy from the admin server before the reboot??
  10. Like I said, rules that allow communications between the DHCP server and clients on ports 67 and 68 already exist in our packet filtering policy. How do you exclude a port from monitoring???
  11. I have a weird problem with one of my systems running Win7 with KAV where occasionally the system loses it DHCP IP and is unable to renew it. If a static IP is assigned instead, everything works OK. After playing around with KAV settings I have discovered that this is only happening with Anti-Hacker component is running and High Security mode is enabled. Note that the active packet filtering policy does in fact have a rule allowing DHCP traffic with logging enabled. AH reporting feature shows allowed traffic between server and client on UDP ports 67 and 68, as expected (and obviously with no way to look at the actual packets). However, logging with Wireshark on the server side shows that everything the server sees from the client is DHCPDISCOVER packets. The server sends back a DHCPOFFER packet, however the client seems to ignore it and instead of continuing the conversation with DHCPREQUEST it kees sending more DHCPOFFER's.... Again, if KAV is unloaded, everything works. If Anti-Hacker is disabled, everything works. If KAV enabled with Anti-Hacker in Low-Security or Training mode, everything works. Switch it to High Security - DHCP breaks. Any ideas?
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.