Jump to content

raviparker

Members
  • Posts

    115
  • Joined

  • Last visited

    Never

Posts posted by raviparker

  1. Are computers being managed by KSC?
    If yes, changing the task to download from the Internet, can you update the computers?
    Is Network Agent communicating with KSC?

    Hey there, I have the same issue encountered and NO, by changing the task to download from the internet doesn’t solve the problem. Yes Network agent is communicating with KSC.

    I tried rolling back the database update and re-running the update task from internet but no use.

  2. Hello,

    what do you mean by “universal security policy settings are applied everywhere”. Kindly make sure you are using 2 different policies for servers and clients. And also, those policy must correspond their respective ones. Both the policies are different as far as there settings are concerned.

    You can check this by going into the policy tab on managed devices. From my experience this happens when you use client policies on server.

  3. thanks for responding.  I have got this to work by adding exclusions into Trusted Applications and Scan Exclusions, where I ended up excluding the whole folder (thanks to Isabel from support).

    The question is why is this happening now on and only on certain machines when it was working perfectly well before for everyone.  I don’t like the idea of excluding complete folders

    If you have enable KSN in your client devices, When an application is started for the first time, the Host Intrusion Prevention component checks the security of the application and places it into one of the trust groups, data that is obtained through Kaspersky Security Network allows it to sort applications into groups with more accuracy and to apply optimum application privilege control rules.

    These checks are performed every time the application is run, and it’s reputation is checked via KSN, if something is found odd or the version difference is found, KES may drop it to restricted or the default trusted group resulting the app to not work as you want it to.

  4. Hello There,

    Ofcourse, you can use it without disabling HIP. What you must is, add the specific application as trusted in HIP option.

    Go to your KES policy « advanced threat protection<<host intrusion prevention

    Then go to Application rights, search there you app or the process that uses your mic or webcam. You can use the wild card to search and pin point your application. Mark it trusted and apply.

×
×
  • Create New...