1/13/2024 0 Comments Instaling Integrity PlusConfigure encrypted connections scan settings.Receive information about application actions on your device.Scan containers, images and namespaces, as well as use Kaspersky Endpoint Security as a container application (hereinafter referred to as KESL container).Scan inbound network traffic for activity that is typical of network attacks.Check removable drives when connected to your device.Configure flexible restrictions on access to data storage devices (hard disks, removable disks, CD / DVD drives), data transfer equipment (modems), data conversion devices (printers) and interfaces for connecting devices (USB, FireWire).Analyze traffic sent to users' devices via HTTP / HTTPS and FTP and check if web addresses are malicious or phishing. Protect files in local directories with network access via SMB / NFS from remote malicious encryption.Manage the operating system firewall and restore the set of firewall rules if they were changed.System Integrity Monitoring can be performed in continuous monitoring mode and in on-demand scan mode. Monitor the integrity of the system or specified files and report changes.During the scan process, the application analyzes each file for the presence of a threat: it compares the file code with the code of a specific threat and looks for possible matches. Use application databases to detect and disinfect infected files.Update application databases from Kaspersky Lab's update servers, via the Administration Server, or from a user-specified source on schedule and on demand.Update the application with service packs.Add keys and activate the application using activation codes.Manage tasks and configure their settings.Save backup copies of files before disinfection or deletion and restore files from backups.Automatically select an action to neutralize the threat.Detect infected objects and neutralize threats detected in them.Scan startup objects, boot sectors, process memory, and kernel memory.Scan objects in the file system both in real time using the File Threat Protection task and on demand using scan tasks.Scan file system objects located on local disks of your device, as well as mounted and shared resources, which are accessed via SMB and NFS protocols.Kaspersky Endpoint Security 11.4.0 for Linux ("Kaspersky Endpoint Security," "Application") protects devices running Linux operating systems against various types of threats, including network and scam attacks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |