Jump to content

ak01

Members
  • Posts

    257
  • Joined

  • Last visited

Posts posted by ak01

  1. We use a connection gateway to manage computers outside the organization (KSC12.2). It works fine, however, if we would like to do desktop sharing, we have to activate “Do not disconnect from the Administration Server” and wait until the next sync period (max. 15 Min.) at least the first time.

    https://support.kaspersky.com/ksc/12/en-US/13051.htm

     

    I found the following information:

    "KLHST_WKS_KEEP_CONNECTION"

    Boolean

    "Keep connection" flag – connection between host and administration server will be persistent if this attribute is set to true. Use with care – persistent connection took much system resources on server.

    There may be no more than 100 hosts with this flag set.

     

     

    Are the 100 hosts a hard limit or just an advice? What happens, if I activate that on 1000 computers?

  2. I used the new feature to block keywords (attachment and content filter) and it worked when an e-mail gets received. However, when a mail is already stored in the mailbox(es) and I do a manual scan, it seems that it does not use the attachment filter rules so that it does not find the blocked keywords/mails containing them. However, when the administrator wants to clear harmful mails within all mailboxes afterwards, it would be nice to be able to do that with a manual scan and such a keyword rule. Is this behavior as expected or a bug?

     

    the rule:

     

    manual scan:
     

     

    nothing found ( but I sent a mail including that keyword and when I send that mail again after creation of that rule, it gets blocked):

     

  3. I think this is not a Kaspersky issue. Try to preview/mark another file and after that, try to rename/delete the previous one (I think the explorer keeps a handle on the last previewed file, even when you already highlight another file with no preview).

    You could try to disable K and test it. If the problem does not occur in that case, try to disable single K components and so on (in order to find the component, which causes the issue).

  4. Is it possible to deploy certificates from a Microsoft pki automatically to iOS devices in order to authenticate to 802.1x wireless networks (deploy a wifi profile and deploy an individual device certificate from a pki automatically)?

    I found the possibility to do that for VPN and Active Sync, but not for wireless. Does it work?

    When I configure an Active Sync or VPN profile, I can select certificate templates (“Zertifikatsvorlage”) for authentication, however, when I configure a wifi (WLAN) profile, I cannot select a certificate template (I guess that it only supports manually imported certificates).

    I guess that this feature does not exist (yet) but it would be very useful for enterprise companies. Maybe you can consider adding that in the next KSC versions?

     

     

     

     

     

     

  5. I found the announcement of the new feature “There is now protection against spoofing (faking the sender address for the purpose of concealing the actual author of an email message).” https://support.kaspersky.com/KS4Exchange/9.6/en-US/100302.htm

     

    How does it exactly work? How does it recognize spoofed addresses? When it found a spoofed address, does it change the spam score (how does it look like for the user)? I have not found any additional explanation of that feature. Do I have to turn it on or is it turned on by default (where do I find the corresponding settings)?

  6. The solution is to do it according to the manual. The laptops (wherever they are, they do not have to be member of the specific subgroup) should get a new agent policy. Within the agent policy, there must be a new network profile which points to the connection gateway (in the appropriate filed) and a rule which only switches to the CG e.g. when the Windows domain is not reachable anymore (otherwise, the default KSC is used -> I have not touched that).

    Therefore, I created a subgroup “Notebooks” in every site subgroup and put a specific agent policy in every “Notebooks” subgroup (see above). However, the CG is only bound to a specific subgroup (e.g. “external devices”) and the laptops are not member of that subgroup (and it works as well).

×
×
  • Create New...