Jump to content

Search the Community

Showing results for 'Quick Launch Keyboard'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • English Forum
    • Products for Home
    • Products for Business
    • KasperskyOS, Development
    • Kaspersky Centers of Expertise
    • Kaspersky Anti-Ransomware Tool
    • Beta Testing Products for Home & Business
  • Русскоязычный форум
    • Продукты для дома
    • Продукты для бизнеса
    • KasperskyOS, Разработка
    • Центры Экспертизы «Лаборатории Касперского»
    • Kaspersky Anti-Ransomware Tool
    • Бета-тестирование продуктов для дома и бизнеса
  • Deutschsprachiges Benutzer-Forum
    • Für Privatanwender
    • Für Unternehmen
  • Forum para usuarios hispanohablantes
    • Para usuarios particulares
    • Para empresas
  • Forum des Utilisateurs Français
    • Pour particuliers
    • Pour les entreprises
  • Fórum Brasileiro
    • Para casa
    • Para PMES e empresas
  • 中文论坛
    • 家用产品支持
    • 企业产品支持
  • Forum in Italiano
    • Utenti privati
    • Aziende
  • Türkçe Forum
    • Ev için
    • İş için
  • Nederlands Gebruikersforum
    • Voor thuis
    • Voor bedrijven
  • Forum Knowledgebase
    • Instructions
    • Advice and solutions
  • The heat's Topics

Blogs

  • Kaspersky Anti Targeted Attack & EDR Expert's KATA & KEDR Expert community articles
  • Kaspersky Security Center's Kaspersky Security Center Community
  • Kaspersky Endpoint Security's Kaspersky Endpoint Security
  • Kaspersky Unified Monitoring and Analysis Platform's Advice and Slutions
  • Kaspersky Endpoint Security Cloud's Kaspersky Endpoint Security Cloud
  • Kaspersky Security for Mail Server's Kaspersky Security for Mail Server
  • Kaspersky Embedded Systems Security's Kaspersky Embedded Systems Security
  • Kaspersky Security for Internet Gateway's Kaspersky Security for Internet Gateway
  • Kaspersky Security Awareness's Kaspersky Security Awareness
  • Kaspersky Hybrid Cloud Security's Kaspersky Hybrid Cloud Security
  • Kaspersky EDR Optimum's Kaspersky EDR Optimum

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

  1. There is an example of a step-by-step instruction to configure Single-Sign-On (SSO) for KATA 4.1/5+/6+ into HOME.LAB domain. Prerequisites Deployed Central Node Server Name should be FQDN. (In current case FQDN name of Central Node - kata-cn.home.lab) It can be checked via Settings/Network Settings of Central Node. A and PTR record should be set for Central Node in DNS. Domain User Account should be created to set up Kerberos authentication by means of keytab file (in current case Domain User Account is kata-sign-on). AES256-SHA1 encryption algorithm should be enabled into created Domain User Account. Step-by-step guide to create keytab file On Domain Controller: Launch CMD As Administrator Execute the following command to create keytab file C:\Windows\system32\ktpass.exe -princ HTTP/kata-cn.home.lab@HOME.LAB -mapuser kata-sing-on@HOME.LAB -crypto AES256-SHA1 -ptype KRB5_NT_PRINCIPAL -pass * +dumpsalt -out C:\TEMP\kata-sgn-on.keytab The utility requests the kata-sign-on user password when executing the command. The SPN of the selected server is added to the created keytab file. The generated salt is displayed on the screen: Hashing password with salt "<hash value>" For multiple Central Node servers you need to save "<hash value>" of hashing password to add an SPN for each subsequent Central Node servers further using ktpass.exe utility. On Central Node Web Interface Move to Settings/Users/Active Directory Integration Add the created keytab file: Keytab file status section contains File which contains SPN for this server The file contains section HTTP/*****@*****.tld Under Users tab click Add and select Domain user account. Set domain user as <username>@<domain> On client machine Host should be joined to the same domain. Domain user should be logged in with account added into the Central Node. Open Control Panel/Internet Options Click on Security and select Local Intranet Click on Sites and then on Advanced Add FQDN of central node - kata-cn.home.lab Close windows: Launch Web Browser and access to Web Interface of the Central Node https://kata-cn.home.lab:8443 and it should be opened without asking any Login/Password.
  2. I'm trying to install kaspersky stander plus, once downloaded the installer do nothing. I have tried: Run as administrator Clean temp files Installed framework 4.8 Windows updates are up to date I dont know what else to do. The installer does not run on windows 10. The wizard to instal the antivirus does not appear.
  3. This instruction is relevant only in case of troubleshooting incorrect loading or rendering of a web page. In order to troubleshoot issues KES network traffic related issues traffic dump is required. It is easier to analyze and does not require third-party software installation. If reproduction of the issue requires the web browser to open web pages(such as web control non-working as expected, web page not loading, and so on), the tests should be performed in Incognito mode(also known as private browsing). Chrome browser: Ctrl+Shift+N or you can start browser from terminal: & "C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -incognito . Starting application from terminal will make launch key visible in traces and make diagnostic easier. Firefox browser: Ctrl+Shift+P or you can start browser from terminal: & "C:\Program Files\Mozilla Firefox\firefox.exe" -private-window . Starting application from terminal will make launch key visible in traces and make diagnostic easier. Microsoft Edge: Ctrl+Shift+P Opera browser: Ctrl+Shift+N KES11/12 Instructions Disable KES11/12 Self-defense Navigate to the following registry key: x86: HKLM\SOFTWARE\KasperskyLab\protected\KES<Build version>\environment\ x64: HKLM\SOFTWARE\Wow6432Node\KasperskyLab\protected\KES<Build version>\environment\ Create a string type value named DumpNetworkTraffic : DumpNetworkTraffic = (REG_SZ)"1" Restart the product or reboot the host Traffic dump files will be saved to %ProgramData%\Kaspersky Lab\KES<Build version>\Data\traffic Once the issue is reproduced compress the whole traffic directory Do not forget to disable traffic dump collection. To do so delete DumpNetworkTraffic value.Then restart the product or reboot the host.
  4. This installer (screenshot) is signed properly, Trusted (digital signature). But installation fails. Because now it's Untrusted installer. What if the unsigned file is new and just unknown in KSN? It will be blocked even with enabled trusting digitally signed apps. And the product will not report this, there will simply be an installation/update/launch error. There is also apps Trusted (digital signature without confirmation). These apps will be blocked instead of running normally in the Low Restricted group. So, there can be a lot of problems with these settings.
  5. Problem Using EDR, you may encounter an issue where you're unable to view incident card regarding a detection in KSC Web Console. It looks like this: Here we will discuss known causes of such behavior (several products are involved, so causes may be different). Possible causes and solutions MDR In MDR, incidents are to be viewed using the dedicated MDR Console, and KSC version 13 and newer with configured MDR plug-in. KSC 12.* Web Console will not receive the data; this is expected behavior. KES+KEA If you first install KES without EA component, and then a standalone KEA package, KES EDRO integration will be disabled and killchain will not work. Here is a quick way to determine if KEA was installed as a component of KES. Open regedit, then navigate to: [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\KasperskyLab\protected\KES\Installer\features] "AntiAPTFeature" = "1" If the value is 0, proceed to the workaround to enable the component as described below. To fix this, we ran Change application components task on the host, enabling Endpoint Agent in KES. If KES/KEA integration is configured correctly, we can find the following in KES traces: 12:08:37.426 0x2a18 INF edr_etw Start processing detect = http://www.virusanalyst.com/eicar.zip//eicar/eicar.com, recordId = 6, taskId = 1128, result = 0 12:08:37.426 0x2a18 INF edr_etw Start processing actions = http://www.virusanalyst.com/eicar.zip//eicar/eicar.com, action = 4, recordId = 6, taskId = 1128, edrAction = 3489660999, result = 0 12:08:37.442 0x2a18 INF edr_etw Killchain is enabled! 12:08:37.442 0x2a18 INF edr_etw SystemWatcher is running! 12:08:37.442 0x2a18 INF edr_etw product::component::edr::`anonymous-namespace'::IsSystemWatcherDetect begin 12:08:37.442 0x2a18 INF edr_etw product::component::edr::`anonymous-namespace'::IsSystemWatcherDetect end 12:08:37.442 0x2a18 INF edr_etw product::component::edr::`anonymous-namespace'::InvestigateProcessIds begin 12:08:37.442 0x2a18 INF edr_etw product::component::edr::`anonymous-namespace'::InvestigateProcessIds end 12:08:37.442 0x2a18 INF edr_etw Finish processing detect = http://www.virusanalyst.com/eicar.zip//eicar/eicar.com threat status = 1, recordId = 6, taskId = 1128,result = 0 12:08:37.458 0x1f18 INF edr_etw Finish processing AV detect result = 0 Searching for ThreatID in KEA traces: 12:08:37.426 0x2a18 INF amfcd ThreatsProcessingEventsLogic::OnTreatActionImpl: ctx:0x23d68510 [TI 0x1b8dd490: id = 0x6, : tdid = {7F620459-6C51-9E46-9A5D-689A9B0D0098}, name = http://www.virusanalyst.com/eicar.zip//eicar/eicar.com, add info: <none>, 0x0] 0x4 0x0 KES+KEA (upgrade from KESB to EDR Optimum) EDR Optimum requires KSC 12.1 or newer to work. This includes the Network Agent, which is a part of KSC, and is generally installed on the host alongside KES. Using an outdated version of Network Agent (10.5, 11, etc.) will lead to the mentioned error when opening incident cards. If Network Agents were not upgraded along KSC, it's better upgrading them for EDR Optimum. KES 11.7+ Check that EDR Optimum feature is enabled in registry (GSI > Registry > HKLM_Software_Wow6432Node_KasperskyLab.reg.txt ). [HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\KasperskyLab\protected\KES\Installer\features] EdrOptimumFeature = 1 If value is 0, run Change application components task on the host, enabling EDR Optimum in KES. Also in traces (*.SRV.log) you can search for sentence bundles::InstalledFeaturesProvider::InstalledFeaturesProvider and check that EDROptimumFeature is there, for instance in example below such component is missing KES.21.9.6.465_05.18_14.00_3952.SRV.log 11:00:36.897 0x26a0 INF bundles::InstalledFeaturesProvider::InstalledFeaturesProvider{ 3 (AVScannerAndCoreFeature) 28 (AdaptiveAnomaliesControlFeature) 0 (AdminKitConnectorFeature) 24 (AdvancedThreatProtectionFeature) 27 (AmsiFeature) 7 (ApplicationControlFeature) 17 (BehaviorDetectionFeature) 30 (CloudControlFeature) 4 (CriticalScanTask) 6 (DeviceControlFeature) 23 (EssentialThreatProtectionFeature) 11 (ExploitPreventionFeature) 8 (FileThreatProtectionFeature) 19 (FirewallFeature) 5 (FullScanTask) 2 (HostIntrusionPreventionFeature) 16 (MailThreatProtectionFeature) 14 (NetworkThreatProtectionFeature) 12 (RemediationEngineFeature) 25 (SecurityControlsFeature) 18 (UpdaterTask) 21 (WebControlFeature) 20 (WebThreatProtectionFeature) 22 (WholeProductFeature) } KSWS+KEA The same rule applies: KEA component needs to be installed in KSWS. KSWS does not have a "Change application components" task in KSC, so this has to be taken into account during KSWS deployment. Here is a quick way to determine if KEA was installed as a component of KSWS. Open regedit, then navigate to: [HKEY_LOCAL_MACHINE\Software\Wow6432Node\KasperskyLab\\WSEE\11.0\Install] "Features"="AntiCryptorNAS=0;AntiCryptor=0;AntiExploit=0;AppCtrl=0;AVProtection=0;DevCtrl=0;Fim=0;Firewall=0;ICAPProt=0;IDS=0;Ksn=0;LogInspector=0;Oas=0;Ods=0;RamDisk=0;RPCProt=0;ScriptChecker=0;Soyuz=0;WebGW=0" (Soyuz needs to be set to 1) If Soyuz is set to 0, apply workaround to enable it. KSWS allows to change its components locally or via cli. Here is the example of how to set Soyuz=1 when KEA was installed not as a component of KSWS: 1. Locate ks4ws_x64.msi or ks4ws.msi (depends on OS architecture) 2. Create custom installation package based on ks4ws_x64.msi or ks4ws.msi from p.1 with parameters as per screenshot (add UNLOCK_PASSWORD= if KSWS is protected by password in policy) 3. Deploy package on problematic servers with KSWS and KEA, then check registry that Soyuz=1 4. Check host's properties at KSC side - EDRO should be in Running state in KEA If KSWS/KEA integration is configured correctly, we can find the following in KSWS traces: 19:57:04.577 7a8 1310 info [edr] Published ThreadDetected: VerdictName : HEUR:Win32.Generic.Suspicious.Access RecordId : 0 DatabaseTime : 18446744073709551615 ThreatId : {ffb58079-6d8d-4a62-8ab0-021ff4ed61c5} IsSilent : false Technology : 3489661023 ProcessingMode : 3489660948 ObjectType : 3489660934 ObjectName : C:\Windows\System32\wbem\WmiPrvSE.exe Md5 : e1bce838cd2695999ab34215bf94b501 Sha256 : 1d7b11c9deddad4f77e5b7f01dddda04f3747e512e0aa23d39e4226854d26ca2 UniquepProcessId: 0xf7c807730e051a0d NativePid : 3360 CommandLine : AmsiScanType : AmsiScanBlob : FileCreationTime: 1601-01-06T23:09:56.075520800Z Searching for ThreatID in KEA traces: 19:57:05.583 704 9b0 debug [bl] ThreatsHandler: detect v2 verdictName: HEUR:Win32.Generic.Suspicious.Access detectTechnology: 0xd000005f processingMode: 0xd0000014 objectType: 0xd0000006 objectName: C:\Windows\System32\wbem\WmiPrvSE.exe nativePid: 3360 uniquePid: 17854528913448180237 nativePidTelemetry: 3360 uniquePidTelemetry: 17854528913448180237 downloaderUniqueFileId: <none> downloadUrl: <none> isSilentDetect: false threatId: ffb58079-6d8d-4a62-8ab0-021ff4ed61c5 19:57:05.583 704 650 info [evtstt] NetworkConnectionHandler statistics: queueSize=0, received=59675, processed=59675, dropped=0, queueBytes=191 19:57:05.583 704 650 info [evtstt] NetworkConnectionHandler statistics: queueSize=0, received=59676, processed=59676, dropped=0, queueBytes=132 19:57:05.583 704 650 info [evtstt] NetworkConnectionHandler statistics: queueSize=0, received=59677, processed=59677, dropped=0, queueBytes=371 19:57:05.583 704 9b0 debug [bl] Threats Handler: event processed, id = 2 19:57:05.584 704 1fc debug [killchain] Message discarded: name = ThreatDetect The verdict is Message discarded, this means the detection won't trigger killchain generation. No such entries can be found in traces, which might mean that EPP integration is not configured correctly (EDR component is disabled in KSWS). Check killchain presence on the host If all pre-requisites are met, it's worth checking if killchain files are actually created on the host. To check that, run cmd.exe as Administrator and check the c:\ProgramData\Kaspersky Lab\Endpoint Agent\4.0\Data\killchain\detects folder contents. Archives with <threat_id>.zip names should be present in the folder: C:\WINDOWS\system32>dir "c:\ProgramData\Kaspersky Lab\Endpoint Agent\4.0\Data\killchain\detects" Volume in drive C has no label. Volume Serial Number is 8010-ADC0 Directory of c:\ProgramData\Kaspersky Lab\Endpoint Agent\4.0\Data\killchain\detects 08/16/2021 12:20 PM <DIR> . 08/16/2021 12:20 PM <DIR> .. 08/16/2021 09:34 AM 636 0349c190-4ac3-4da4-9b64-07835298660f.zip //this is an archive with killchain info 08/16/2021 12:18 PM 696 1d306aa7-f37f-4ab2-969e-d337d398a995.zip 08/16/2021 09:34 AM 637 23a5dc93-5776-43c8-b949-79c102aa1184.zip 08/16/2021 12:19 PM 691 27bc9ea3-200b-49d2-b8b0-df7954cd428a.zip 08/16/2021 12:19 PM 683 40673c70-9e8e-420f-b5ce-65b406862b94.zip 08/16/2021 12:19 PM 688 590b6e30-4509-4b25-bdb0-062f89b7e062.zip 08/16/2021 12:20 PM 693 67993612-dc82-45a2-9e5b-74756adc46eb.zip 08/16/2021 12:20 PM 685 6a892bd1-f452-42d0-80b0-cb953cd7fc26.zip 08/16/2021 12:19 PM 686 a63fbafa-fcef-46f7-935f-42be4392a172.zip 08/16/2021 12:19 PM 699 d9d4f5eb-42b2-4460-8f8a-eb63bbef8791.zip 08/16/2021 12:19 PM 686 f6042624-9840-4a6e-9b30-9270cce22236.zip 11 File(s) 7,480 bytes 2 Dir(s) 240,763,092,992 bytes free
  6. windows 8.1 Kaspersy total security 21.3.10.391 (h) device used: Laptop. until a couple of weeks ago my virtual keyboard worked fine. now when I use it, it will not close down, it will only close when I shut down safe banking completely. I have tried using it in other browsers, firefox, chrome, brave, duckduckgo but that makes no difference. It is very annoying as it blocks the page I'm using when doing my banking.
  7. My Windows version: WIndows10 22H2 (OS Build 19045.4651) Kaspersky PLUS 21.18.5.438 The problem: After the lastest Kaspersky PLUS's Application update, my On-screen Keyboard becomes bugged. You can see from the 2 screenshots, my mouse cursor was positioned at Number 0, but it counts as Number9. I have been using Kaspersky for many years, and I use On-screen Keyboard for many years, this bug never happened to me before.
  8. quick scan dose not appear in the dropdown list of windows
  9. I found Kaspersky, as well as two other previous softwares, cannot discern between a standard form field and one that needs extra care. Always sticking the prompts in a standard address field or whatever. I did find a control for this in the primary Kaspersky interface by typing "key" in the search field at the top, and selecting secure data input. You can keep the function enabled, but called upon with a keyboard shortcut only, and then disabling the prompt. You can choose types of fields you want the virtual keyboard to pop up in, but I have no faith. I have Bitwarden for my passwords and credentials, so no typing anyway.
  10. Greetings once more. It have been a wild in the past months holding onto KS 21.21.7.384(a) bugged version and hoping for a future version to address the issues that I have listed in the past. However as the sutomatic system that execute these installation and convert the prévios Kaspersky protection to a newer version comes always along with another to address. The welcome / front page of the interface next to 🟢 shield. The message previously showed the followed message: "Vírus/malware detection is active" Now the Reading It says a duplicate message as It reads: "Main protection components are running/ are active". Meanwhile going to Security tab ro check all protection components, the reading still show "All components are active". I mean these phrases are becoming repetitive and unwelcome. Also there is on troubling problem with mouse quick Scan prompt menu where It Will bring now a duplication of KS rundown. I was avoiding to install my previous KS 21.21 because I've suspected there would bem another version comming out anytime soon. With KS 21.22 install applied. Do I have to fully unistall and fresh download from My Kaspersky This version to repair this KS mouse Scan duplication? Or should I wait as I've been waiting for months to get a proper fiz for KS 21.21 major issues?
  11. P.S. It seems that I have missjudged the issues with quick mouse scan. I have restarted my Wind.11 23h2 like a normal restart and I ran the action with the mouse to any icon on screen and the problem didnt appear. But I will keep monitoring for bugs, abnormal symptoms.
  12. So I have a Logitech-macro on my left mousebutton that I use in games and it worked fine before I installed kaspersky. Now whenever I'm ingame the macro does not work anymore, I've created exceptions for Logitech-GHUB and the game (Tarkov), but still the macro won't work. :(
  13. Hallo! Habe soeben erstmals Kaspersky auf meinem Rechner installiert, der Grund war, dass am rechten unteren Bildschirmrand ein kleines quadratisches Fenster aufging mit der Meldung "quick driver update" - ich halte das für einen Virus oder sonstigen Trojaner oder Müll. Nach der Installation und vollständiger Systemprüfung erscheint das Fenster immer noch. Es lässt sich mit dem Task Manager unter "task beenden" wegklicken. Weiss jemand, was das "quick driver update" ist? - ein Virus, Trojaner, sonstwas?
  14. @noone You are welcome. Open Firefox Click on the F12 function key on the top row of your keyboard The 'Developer Tool' half opens at the bottom inside Firefox Install the Kaspersky Firefox extension Check if any "Error" shows up in the 'Developer Tool' ?
  15. Hi, I'm not sure wether this is the right forum or the right english term for it, but I have a problem with that little window that opens whenever I try to enter something into a searchbar. As seen in the screenshot, it completely blocks a large part underneath the searchbar for no apparent reason. A lot of the time it blocks auto completion or other stuff for several seconds, making the work process slower. I think I don't have to be reminded that the secure keyboard input is active everytime I want to enter something. Is there a means to have that box toggled off?
  16. Kaspersky Security Services is a suite of professional offerings provided by Kaspersky to help businesses and individuals maximize cybersecurity defenses and minimize risks. Below is an overview of these services: 1. Kaspersky Professional Services Tailored for businesses, this includes deployment, configuration, and optimization of Kaspersky solutions to align with the organization’s specific security policies and IT environment. Implementation Services: For smooth deployment of Kaspersky products like Security Center, Endpoint Security, and more. Health Checks: Ensure the Kaspersky solution is optimally configured and running efficiently. Migration Services: Seamlessly upgrade or migrate between Kaspersky versions or platforms. Custom Integration: Adapt Kaspersky solutions to integrate with other IT systems. 2. Managed Security Services (MSS) A subscription-based model where Kaspersky oversees and manages security for businesses. Threat Monitoring and Incident Response: 24/7 monitoring, threat detection, and remediation by Kaspersky experts. SOC-as-a-Service: A cloud-based Security Operations Center tailored to SMEs. Endpoint Detection and Response (EDR): Active protection against advanced threats targeting endpoints. 3. Cybersecurity Training and Awareness Programs aimed at enhancing cybersecurity skills and awareness for IT teams and employees. Security Awareness Training: Courses to reduce the risk of human errors, such as phishing attacks. Cybersecurity Certification Programs: For IT professionals managing Kaspersky solutions. 4. Incident Response and Forensics Kaspersky provides post-incident support to contain breaches, analyze root causes, and help recover systems. Emergency Incident Response: Quick reaction to active cyberattacks to minimize damage. Digital Forensics Services: Investigating cyber incidents and collecting actionable evidence. 5. Threat Intelligence Services Access to Kaspersky’s global threat intelligence data for advanced insights into the threat landscape. API Integrations: Feed real-time threat data into SIEM or SOAR platforms. Tailored Threat Intelligence Reports: Insights into regional or sector-specific cyber threats. APT Intelligence: Detailed analysis of Advanced Persistent Threats. 6. Penetration Testing and Vulnerability Assessment Comprehensive evaluations of your security infrastructure to identify vulnerabilities. Penetration Testing: Simulating real-world attacks to test defenses. Vulnerability Assessments: Scanning and analyzing systems for weak points. 7. Data Protection Services Help businesses achieve compliance with data protection regulations (e.g., GDPR) and secure sensitive information. Data Loss Prevention (DLP): Implement strategies to prevent unauthorized data leakage. Encryption Services: Ensure data remains safe even if devices are lost or stolen. 8. Cloud Security Services Secure cloud workloads and hybrid environments with dedicated solutions. Public and Private Cloud Security: Solutions for Microsoft Azure, AWS, Google Cloud, etc. Cloud Workload Protection: Secure virtual machines, containers, and storage. 9. Threat Hunting Services Proactively seek out hidden threats that may bypass traditional defenses. Proactive Threat Hunting: Expert-driven analysis using Kaspersky tools. Customized Detection Rules: Tailored rules for detecting anomalies in your systems. 10. Compliance and Risk Assessment Services Support organizations in meeting regulatory requirements and reducing overall security risks. Compliance Gap Analysis: Identify gaps in adherence to frameworks like ISO 27001, PCI DSS, and others. Risk Assessment: Holistic evaluation of your IT infrastructure’s security posture.
  17. I was locked out of several accounts because I couldn’t receive SMS on my old number, which no longer works. Needed a quick way to get verification codes without relying on my carrier. Used another mobile service — picked a UK number directly in the browser, no registration. The code arrived in under two minutes. Since it’s a real SIM-based number, not VoIP, it worked with services that usually block virtual lines. Didn’t have to install an app or reactivate a physical SIM.
  18. Hello, Additionally, you can change the language of the installed version to English within the application by pressing SHIFT + F12 on the keyboard, and if you want to return to the original installed language by pressing SHIFT + F5 on the keyboard. You have to do it every time Otherwise, you have to do what your colleague mentioned. Regards
  19. Driftingraft

    Kaspersky closing the Free version

    Excellent, will try this method instead. Just one more question, should I first uninstall my existing kaspersky before launching the installer? Or just launch it as is with the application in my system and just wait for it to be overwritten Edit: Additionally: which version are you on? Im not sure if this installer i have will bring me up to the latest version (the one the Estonian, Latvian etc... has) or if i will be perma locked in this 21.21.7.384 version.
  20. Dear KIS Community I don't know why KIS block Brave Browser every first time launch it. When start browsing, it is blocked. Second time of launch it I can browse. Moreover, If I exit my second times browser window then third times is not work too. Unless reopen it (4th). Error by the following action like this. Moreover, I can't find the solution of such this case over Google also. Please help. If the problem still exist, might not renew license. Really bored.
  21. Hi, last week my subscription to another internet security ended (not sure if it matters, it was GData). I decided to switch to Kaspersky. I installed Kaspersky Premium and only later removed the older IS, so that there would be no gap. When Kaspersky did a quick search, it found 2 suspicious files, one was a jpg file, which I didn't recognise and it was at a very strange location and another was called hosts.rollback (or something similar). Both files were infected and both files were also removed by Kaspersky. So I'm convinced Kaspersky is doing it's work. ButAfter that first installation and check, I started getting very frequent BSOD's, almost every 5-10 minutes. The message on the blue screen is: IRQL is not equal or less (or something like that, it disappears real quick). The message in event viewer is as follows: The computer has rebooted from a bugcheck. The bugcheck was: 0x0000000a (0x0000000004e2b34c, 0x0000000000000002, 0x0000000000000000, 0xfffff805e8a9f600) I have googled the issues at best as I could, I did a few things, like system file checker etc. in windows, I also checked my memory, hard drive(s) en motherboard bios. Nothing seems to be helping. In the last year my pc crashed about 3 times, caused by faulty drivers by Nvidia. Which seems to be resolved after new drivers. And now I have a few houndreds of crashes in just 4-5 days. So I can get in touch with Kaspersky customer service, but they ask for a complete dump of the crash, to be able to do this, I have to follow 2 steps. I cannot finish the first step, because I get a warning from windows that I cannot change that value because of some group policies. Did anyone encounter an issue like this and how can I resolve this? <Edit: I have win11, 24H2, 26100-4351, quite well built gaming system with all elements just 1 year old, everything seems to be in perfect order. Like I said, I have Kaspersky Premium.
  22. Hi all , I have a VPN software called SurfShark takes long time to launch because of Kaspersky Standard. I've changed some settings in Exclusion of applications but I don't know if that safe or not ? At past I used multiple VPN software launch Fastly with no delay just this software. Hope to tell me about what I did if it's safe or not ?
  23. Problem Description, Symptoms & Impact The installation of the Network Agent isn't possible on a device because of the error System error 0x1F (A device attached to the system is not functioning.) Diagnostics In the MSI Log and Application Eventlog can be found the following line: (1192/0x0 ("System container 'LOC-PUB-6EEB50F8D2EB46029DB4CCB77E0DA651' is corrupt") Workaround & Solution The issue comes from a corrupt cryptostorage in the OS. It's not a KL related issue, although there is a possible solution to fix it. On the problem host launch cmd.exe with administrative privileges Run klcryptstgclean.exe: klcryptstgclean -tl 4 -tf $klcryptstgclean_trace.txt -l klcryptstgclean.log Try to install NAgent. If it doesn't help, perform actions from the Cryptostorage-1.docx file. If installation fails again, send to Kaspersky Support the following files: "$klcryptstgclean_trace.txt", "klcryptstgclean.log", new GSI with klnagent installation logs. It is not KSC and klnagent related issue. It is OS related issue. If workaround doesn't help, try sfc /scannow command, OS restore, OS reinstallation or contact MS support.
  24. Advice and Solutions (Forum Knowledgebase) Disclaimer. Read before using materials. The article is giving a working configuration instructions for domain authentication by using NTLM and Kerberos protocols. NOTE: Domain authentication in OpenAPI over Kerberos protocol has the following restrictions: Administration Server address must be specified exactly as the address for which the Service Principal Name (SPN) is registered for domain account name. In the domain, you need to set the Service Principal Name (SPN) to publish the OpenAPI service on port 13299 for the machine with the Administration Server, the service of which is running under the name of the domain user <domain-user>. Kaspersky Security Center 13 Web Console user must be authenticated in Active Directory by using Kerberos protocol. Kerberos authentication should be allowed in web-browser. For details, refer to documentation of used web-browser. Details SPN - Service Principal Name Log in Domain Controller as Domain administrator. Open powershell as admin and run the following commands: Powershell setspn.exe -A HTTP/hostname-node-1.domain.local -u domain\user-ksc-service setspn.exe -A HTTP/hostname-node-2.domain.local -u domain\user-ksc-service Example setspn.exe -A HTTP/kscw-node-1.sales.lab -u sales\ksc setspn.exe -A HTTP/kscw-node-2.sales.lab -u sales\ksc setspn.exe -L -u sales\ksc #command for check spn records #Response Registered ServicePrincipalNames for CN=KSC Service,CN=Users,DC=sales,DC=lab: HTTP/kscw-node-1.sales.lab HTTP/kscw-node-2.sales.lab Enable Kerberos/NTLM authentication in web browsers Microsoft Edge \ Internet Explorer win + r => inetcpl.cpl Activate the Security tab. Select Local intranet and click Sites. In the opened dialog box click Advanced. Add the host name of Adaxes Web interface (e.g. host.company.com). Click Close and then click OK. Click Custom level. Navigate to Scripting and enable Active scripting. Navigate to User Authentication \ Logon. Select Automatic logon only in Intranet zone and click OK. Activate the Advanced tab. In the Settings list, navigate to the Security section. Select Enable Integrated Windows Authentication and click OK. Mozilla Firefox - https://developer.mozilla.org/en-US/docs/Mozilla/Integrated_authentication Launch Mozilla Firefox In the URL window, enter about:config and press Enter. In the filter text box, enter network.negotiate. Double-click the network.negotiate-auth.trusted-uris option and enter the host name of Adaxes Web interface (e.g. host.company.com). Repeat previous step for the network.negotiate-auth.delegation-uris option. Google Chrome Add the Software\Policies\Google\Chrome\AuthServerWhitelist key equal to *.<domain-name>.local to the registry Add the Software\Policies\Google\Chrome\AuthNegotiateDelegateWhitelist key equal to *.<domain-name>.local to the registry
  25. Prerequisetes: Supported vSphere by Kaspersky Agentless solution Usage of NSX version 3.2+ Deployed Kaspersky Agentless 6.1 Antivirus or/and Network Attack Blocker Appliance Problem Anew registration and Kaspersky Agentless 6.1 Antivirus or/and Network Attack Blocker Appliance deployment completes successfully. By attempt to create Service Profile for Kaspersky Agentless 6.1 Antivirus or/and Network Attack Blocker fails with error AntiVirus and Network Attack service registration might fail with the error "Service Definition id <ID> <Kaspersky Component> not found in MP Root cause NSX-T does not delete service references of Kaspersky Agentless 6.1 Antivirus or/and Network Attack Blocker Appliance Solution Through terminal like putty you need access to NSX-T appliacnce and launch the command curl -kG https://admin:<PASSWORD>@<nsx-t address>/policy/api/v1/infra/service-references The path value should be remembered for Kaspersky File Antimalware Protection and for Kaspersky Network Protection Delete service reference by path value by launching the command curl -kX DELETE https://admin:<PASSWORD>@<nsx-t address>/policy/api/v1/<value of path> After it delete previously created profile service for Kaspersky Agentless 6.1 Antivirus or/and Network Attack Blocker and create it anew
×
×
  • Create New...