Jump to content

THask

Kaspersky Employee
  • Posts

    54
  • Joined

  • Last visited

Reputation

11 Good

4 Followers

Recent Profile Visitors

1681 profile views
  1. Hi iedco.cybertech, that is easier than you think. KL Certificate moves the traffic as a man in the middle to KES / KAV to scan it.
  2. Hi iedco.cybertech, yes KES have Host Intrusion Prevention. https://support.kaspersky.com/KESWin/12.4/en-US/176731.htm
  3. Hello Mohib, in Cases like this it is most likely the Connection to the Database what is the Root Cause of the Issue. The Informations what's wrong are in Windows System Logs or Kaspersky Event Log. If you want to have fast help I would recommend to open an Incident as Elvin wrote. Normally the Colleagues know the issues from the Logs and can help fast. You can additional create a getsysteminfo Report including Eventlogs and attach this directly to your Incident in the company Account. https://www.getsysteminfo.com/
  4. Hello dsuman, this is only meaning that a SSL Connection between you KSC Server and MS Update Servers could not be established. And Firewall means that it could be MS Windows Defender Firewall KL Firewall etc. More details should be shown in the Events or if you Start a Trace on KSC.
  5. Hello Asiatic Fiber Corporation, so far you're right. unsuccessful attempts to sign in could be also real users so this is not detected or blocked by default. Yes if KES with all Components does not detect something maliscious and you find it, it is faster to create an IoC Scan task to block it before anything else is affected. IoC is additional for preventing infections with doing actions like isolate Device from network.
  6. Hello Cope IT, if you need another contact please let me know with a pm and contact details. I can forward this to our Sales guys in your Country.
  7. Hello xpreme, you can use the Device moving rules and a Installation Group in KSC where a automatic installation Task run in a scheduled time. Device moving Rules: https://support.kaspersky.com/KSC/14.2/en-US/92437.htm Automatic Installation: https://support.kaspersky.com/KSC/14.2/en-US/4626.htm
  8. Hi iedco.cybertech, this could be Downloaded on this Site https://www.kaspersky.com/small-to-medium-business-security/downloads/virtualization-hybrid-cloud?icid=gl_sup-site_trd_ona_oth__onl_b2b_klsupport_tri-dl____ksv___ when you search for Version 6.0.7.1402 | Windows | Kaspersky Security Components Installation Wizard set the Version to 5 and you get the 5.2 Version of Management Components where the Plugin is integrated. Would you like to use a mix of KSV LA Versions or only 5.2?
  9. Hello COPE IT, in which Country you need a Sales Contact or Partner? To find a Partner you can use this Link: https://locator.kaspersky.com/b2b/
  10. Hello Wilton, you can try to install KES 12 for Linux https://www.kaspersky.com/small-to-medium-business-security/downloads/endpoint?icid=gl_sup-site_trd_ona_oth__onl_b2b_klsupport_tri-dl____kes___ If you have any issues with that you can raise a Ticket in the Support normally that will be fast answered.
  11. Hello AP2023, yes if one of this two is working for you, you can use one. It is not necessary to use both ways.
  12. Hello AB2023, you can try it with 2 Exclusion ways. First is adding the Site in the KES Policy at General Settings - Network Settings - Encrypted Connection Scan - Trusted Addresses. Second is open KES Policy and navigate to General Settings - Exclusions and object types - Scan Exclusions and Trusted Applications - Settings - Writer Trusted Applications - Add your Browser.exe File set the do not scan Network Traffic - set all traffic and specify the Remote IP Address The second way is not meaning that your Browser will now not scanned only the IP Address you allowed will not be scanned.
  13. Hello Kisana, you can see the target address when you logged in your workspace (address bar of your browser). Normally it is like https://s0xx.cloud.kaspersky.com where xx is a number of the Server where youre workspace is stored.
  14. Hi Mr. Potatohead, that Event is only meaning that KES named with Path to AVP.exe has detected a Suspicious network activity. Could be a Mail what was downloaded or could be a connection to the Mail Server. Sometimes it is only a false positive Detection. But you can additional have a look on the Mail Server what happend on the Timestamp.
  15. Hi Eleia, this Overview is every time shown and will not be cleared. Only the files what was downloaded and stored in wusfiles Folder will be deleted.
×
×
  • Create New...