Jump to content
Sign in to follow this  

Recommended Posts

The new Kaspersky Security 10.1 for Windows Server brings you the following:

- A newly added Traffic Security component: now you can protect your server from web threats sent through HTTP or HTTPS traffic, in addition to threats delivered via email. This new component supports the following protection scenarios:
 - anti-virus and anti-phishing protection of email traffic using an Microsoft Outlook extension;
 - anti-virus and anti-phishing protection of web traffic; 
 - link verification using databases of malicious web addresses;
 - link verification using cloud-based databases of malicious web addresses;
 - web control using rules for links and certificates
 - web resource control based on categories;
 - verification of web server certificates when connecting.
 
Traffic is protected using the ICAP service in one of three configurations:
 - External Proxy: analysis of traffic redirected from an external proxy server (without a network driver).
 - Redirector: analysis of traffic redirected from browsers launched in a terminal session (without a network driver). The program uses an internal system proxy.
 - Driver Interceptor: Traffic is intercepted using a network driver in a terminal session.

- A new Anti-Cryptor component for NetApp: now you can use a server with Kaspersky Security 10.1 for Windows Server installed to protect connected NetApp network attached storage from malicious encrypting.

- A new Device Control component: now you can form lists of rules that the program uses to allow or block the exchange of files with external data storage devices (USB and MTP mass storage devices, CD/DVD devices).

- A new Exploit Prevention component: now you can configure settings for exploit prevention of process memory using impact reduction techniques.

- A new File Integrity Monitor component: now you can indicate the objects whose integrity you want to monitor.

- A new Log Inspection component: now you can form rules for Windows log analysis, and configure the heuristic analyzer to analyze Windows logs.

- Anti-virus scanning of containers for Microsoft Windows Server 2016 is added. 

- New ability to integrate with external SIEM systems: Now you can configure settings to export application logs to external event aggregation systems using the syslog protocol.

- New ability to track USB connections to protected devices: now you can configure settings for notifications about USB connections made by various types of devices with the protected computer.

- Security Violation Log: now you can view, in a single log, all events logged by application components that indicate the protected system may be compromised.

- A new Firewall Management component: now you can control Windows firewall rules through the graphical user interface of Kaspersky Security 10.1 for Windows Server.

- New ability to scan USB mass storage devices: now you can scan mass storage devices when they are connected to a protected computer.

- New ability to enable password protection for application management: now you can also protect Kaspersky Security 10.1 for Windows Server and use a password to restrict access to critical operations.

- New ability to automatically allow the launch of applications from trusted distribution packages: now you can add exclusions, in the settings for the Applications Launch Control task, for installation packages in order to simplify the process of allowing the launch of files when installing or updating software.

- Simplified Untrusted Hosts Blocking: now the Anti-Cryptor component and Real-Time File Protection component put aliases for compromised nodes into the Blocked Node Storage. In the protection task settings, you can turn off the population of Blocked Node Storage. Moreover, now you can view all blocked nodes in the Administration Server's centralized list.

- Optimized abilities to form a list of rules for trusted processes in the Trusted Zone: now you can exclude processes based on only a hash, only a path, or both a path and a hash.

- Simplified and expanded mechanism for populating lists of application launch control rules: newly added ability to simultaneously use lists of rules configured on local hosts and in a policy, and new mechanism to form rules based on task events in Kaspersky Security Center.

Share this post


Link to post
Guest
This topic is now closed to further replies.
Sign in to follow this  

×
×
  • Create New...

Important Information

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.