SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
PALETTE BUSINESS
SOLUTION
KASPERSKY ENDPOINT
SECURITY
DOCUMENTATION
By
Emmanuel Onwubiko
28th
July, 2016
2 | P a g e
BUSINESS PROCESS GUIDES
3 | P a g e
PROGRAM FLOW DESCRIPTIONS
Please note we used virtualization because we believe every infrastructure/organization have virtual environment and as
such we also covered same platform inclusive of mobile device, desktop, laptop, tablet etc.
4 | P a g e
DATA MODEL DESCRIPTIONS
5 | P a g e
SAMPLE REPORTS
6 | P a g e
SCREEN FORMATS
7 | P a g e
TOOLKIT GUIDES
https://docs.s.kaspersky-labs.com/english/kes10sp1mr2_en.pdf
https://docs.s.kaspersky-labs.com/english/kasp10_best_practicesen.pdf
https://docs.s.kaspersky-labs.com/english/kasp10.0_sc_admguideen.pdf
https://docs.s.kaspersky-labs.com/english/kasp10.0_sc_gsen.pdf
https://docs.s.kaspersky-labs.com/english/kasp10.0_sp2_sc_implguideen.pdf
https://docs.s.kaspersky-labs.com/english/kasp10.0_scwc_userguideen.pdf
TROUBLESHOOTING GUIDES
In Kaspersky Endpoint Security 10 for Windows SP1 Beta1 the following issues can be
useful for trouble shooting.
 In some cases, reports from Kaspersky Security Center contain non-localized events.
This can be checked from the windows event logs and resolution traced.
 In some cases, the product may crash when attempting to send a complaint on access to a
web resource. This may be prohibited by the Web Control component and issue
troubleshooted from same.
 During installation, Kaspersky Endpoint Security removes Microsoft System Center upon
recognizing it as incompatible software.
 In some cases, decryption of files that have been encrypted with File Level Encryption
(FLE) feature may consume up to 100% of CPU resources. This can be addressed, by
checking task manager to see Kaspersky endpoint security avp.com utilization.
 Some Microsoft updates cannot be installed when Kaspersky Endpoint Security is
installed. This is can also be troubleshooted by checking if Kaspersky endpoint
security solution has been successfully installed on client PCs as regards errors from
WSUS server report.
 In some cases, Network Agent may crash when starting the OS.
 In some cases, the system may crash when installing Kaspersky Endpoint Security 10
Maintenance Release 1 for Windows.
 Installing Kaspersky Endpoint Security on a server with the RRAS role results in a loss
of Internet access by all hosts that use that server.
 Local management of group tasks via avp.com does not function, though the
corresponding permission is active in the policy.
 Exclusions in <Disk name>:<File name> format are not supported.
 Kaspersky Endpoint Security is incompatibility with some video drivers.
 In some cases, installation of the application with install.cfg results in an incorrect
behavior of the Web Anti-Virus component.
 In some cases, the System Watcher component mistakenly blocks running applications
located on network resources.
 In some cases, the advanced disinfection procedure cannot disinfect objects in the system
memory.
 The application blocks access to flash drives that support the U3 formatting standard.
 Network Attack Blocker: in some cases, hosts added as exclusions are blocked.
 The application blocks the key shortcut Alt + Ctrl + Shift + P.
 During upgrade for windows 10, Kaspersky endpoint security application is to be
manually uninstalled as this may hinder installation of upgrade.
8 | P a g e
FREQUENTLY ASKED QUESTION (FAQ) GUIDES
Q: What is License information?
A: License information is your product's unique identifier.
Q: What is the difference between the License Number, Installed keys and License
information?
A: All these terms mean the same thing, i.e., License information. Different terms were used in
different product versions.
Q: Why do I have to renew my license?
A: If your license has expired, you cannot receive up-to-date protection for your computer.
Because thousands of new malicious programs appear every day, it would be virtually
impossible to remain protected without regular antivirus database updates. That is why we
strongly recommend that our customers renew their licenses before they expire.
Q: When should I renew my license?
A: It is best to renew your license no earlier than 14 days before the expiration date and no later
than the date the license expires.

Contenu connexe

Tendances

Enterprise App Development for Windows Phone
Enterprise App Development for Windows PhoneEnterprise App Development for Windows Phone
Enterprise App Development for Windows PhoneInnoTech
 
Rails Plugins 1 Plugin
Rails Plugins 1 PluginRails Plugins 1 Plugin
Rails Plugins 1 Pluginoscon2007
 
VMwae VCP-DCV5.5 Training certificate
VMwae VCP-DCV5.5 Training certificateVMwae VCP-DCV5.5 Training certificate
VMwae VCP-DCV5.5 Training certificateMohammed Azher
 
JASPERSOFT LIVE DEMO - EMEA
JASPERSOFT LIVE DEMO - EMEAJASPERSOFT LIVE DEMO - EMEA
JASPERSOFT LIVE DEMO - EMEATIBCO Jaspersoft
 
Quickly Build Spring Boot Applications to Consume Public Cloud Services
Quickly Build Spring Boot Applications to Consume Public Cloud ServicesQuickly Build Spring Boot Applications to Consume Public Cloud Services
Quickly Build Spring Boot Applications to Consume Public Cloud ServicesVMware Tanzu
 
Better Software With Visual Studio 2008 Team System
Better Software With Visual Studio 2008 Team SystemBetter Software With Visual Studio 2008 Team System
Better Software With Visual Studio 2008 Team Systemguested62d1
 
Rapid Development with Azure Spring Cloud
Rapid Development with Azure Spring CloudRapid Development with Azure Spring Cloud
Rapid Development with Azure Spring CloudVMware Tanzu
 
How to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software PitfallsHow to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software PitfallsAventis Systems, Inc.
 
Reversing & malware analysis training part 7 unpacking upx
Reversing & malware analysis training part 7   unpacking upxReversing & malware analysis training part 7   unpacking upx
Reversing & malware analysis training part 7 unpacking upxAbdulrahman Bassam
 
HTTP Security Headers - Devoxx UA 18
HTTP Security Headers - Devoxx UA 18HTTP Security Headers - Devoxx UA 18
HTTP Security Headers - Devoxx UA 18Tim De Grande
 
Sample - Test Cases - Adobe Flash
Sample - Test Cases - Adobe FlashSample - Test Cases - Adobe Flash
Sample - Test Cases - Adobe FlashBob Powers
 
Continuous Deployment at Kitchensurfing
Continuous Deployment at KitchensurfingContinuous Deployment at Kitchensurfing
Continuous Deployment at KitchensurfingLars Kluge
 

Tendances (14)

VTSP 2015 Vsphere 6.0
VTSP 2015 Vsphere 6.0VTSP 2015 Vsphere 6.0
VTSP 2015 Vsphere 6.0
 
Enterprise App Development for Windows Phone
Enterprise App Development for Windows PhoneEnterprise App Development for Windows Phone
Enterprise App Development for Windows Phone
 
Rails Plugins 1 Plugin
Rails Plugins 1 PluginRails Plugins 1 Plugin
Rails Plugins 1 Plugin
 
VMwae VCP-DCV5.5 Training certificate
VMwae VCP-DCV5.5 Training certificateVMwae VCP-DCV5.5 Training certificate
VMwae VCP-DCV5.5 Training certificate
 
JASPERSOFT LIVE DEMO - EMEA
JASPERSOFT LIVE DEMO - EMEAJASPERSOFT LIVE DEMO - EMEA
JASPERSOFT LIVE DEMO - EMEA
 
Quickly Build Spring Boot Applications to Consume Public Cloud Services
Quickly Build Spring Boot Applications to Consume Public Cloud ServicesQuickly Build Spring Boot Applications to Consume Public Cloud Services
Quickly Build Spring Boot Applications to Consume Public Cloud Services
 
Better Software With Visual Studio 2008 Team System
Better Software With Visual Studio 2008 Team SystemBetter Software With Visual Studio 2008 Team System
Better Software With Visual Studio 2008 Team System
 
Rapid Development with Azure Spring Cloud
Rapid Development with Azure Spring CloudRapid Development with Azure Spring Cloud
Rapid Development with Azure Spring Cloud
 
certificate
certificatecertificate
certificate
 
How to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software PitfallsHow to Avoid End-of-Life Software Pitfalls
How to Avoid End-of-Life Software Pitfalls
 
Reversing & malware analysis training part 7 unpacking upx
Reversing & malware analysis training part 7   unpacking upxReversing & malware analysis training part 7   unpacking upx
Reversing & malware analysis training part 7 unpacking upx
 
HTTP Security Headers - Devoxx UA 18
HTTP Security Headers - Devoxx UA 18HTTP Security Headers - Devoxx UA 18
HTTP Security Headers - Devoxx UA 18
 
Sample - Test Cases - Adobe Flash
Sample - Test Cases - Adobe FlashSample - Test Cases - Adobe Flash
Sample - Test Cases - Adobe Flash
 
Continuous Deployment at Kitchensurfing
Continuous Deployment at KitchensurfingContinuous Deployment at Kitchensurfing
Continuous Deployment at Kitchensurfing
 

En vedette

わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1iacer
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.Onwubiko Emmanuel
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Onwubiko Emmanuel
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 

En vedette (6)

わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
わかる中級英文法 Grammar in Use Unit 75 the がつく名前、つかない名前 1
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015Emmanuel's Technical Slides 2015
Emmanuel's Technical Slides 2015
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 

Similaire à PALETTE BUSINESS SOLUTION DOCUMENTATION

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewJermund Ottermo
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Vladi Vexler
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using AnsibleSonatype
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!Marko Heijnen
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guideSudhanshu Chauhan
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
2016 Guide to User Data Security
2016 Guide to User Data Security2016 Guide to User Data Security
2016 Guide to User Data SecuritySean Bryant
 
InterConnect2016 Monitoring Nodejs
InterConnect2016 Monitoring NodejsInterConnect2016 Monitoring Nodejs
InterConnect2016 Monitoring NodejsChris Bailey
 
ESM 5.5 Patch 1 Release Notes
ESM 5.5 Patch 1 Release NotesESM 5.5 Patch 1 Release Notes
ESM 5.5 Patch 1 Release NotesProtect724
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical PresentationJohnTileyITQ
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerGeorge Kanellopoulos
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainInfosecTrain
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysisCARMEN ALCIVAR
 
Chicago ALM User Group - Nov 2014 - Application Insights 101
Chicago ALM User Group - Nov 2014 - Application Insights 101Chicago ALM User Group - Nov 2014 - Application Insights 101
Chicago ALM User Group - Nov 2014 - Application Insights 101Angela Dugan
 
Advanced deployment scenarios (netcoreconf)
Advanced deployment scenarios (netcoreconf)Advanced deployment scenarios (netcoreconf)
Advanced deployment scenarios (netcoreconf)Sergio Navarro Pino
 
The virtues of backup disaster recovery
The virtues of backup disaster recoveryThe virtues of backup disaster recovery
The virtues of backup disaster recoveryZack Fabro
 
ESM 6.9.1c Patch1 Release Notes
	ESM 6.9.1c Patch1 Release Notes 	ESM 6.9.1c Patch1 Release Notes
ESM 6.9.1c Patch1 Release Notes Protect724tk
 

Similaire à PALETTE BUSINESS SOLUTION DOCUMENTATION (20)

AV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software reviewAV-Comparatives’ 2017 business software review
AV-Comparatives’ 2017 business software review
 
Safe peak installation guide version 2.1
Safe peak installation guide version 2.1Safe peak installation guide version 2.1
Safe peak installation guide version 2.1
 
System Hardening Using Ansible
System Hardening Using AnsibleSystem Hardening Using Ansible
System Hardening Using Ansible
 
Security, more important than ever!
Security, more important than ever!Security, more important than ever!
Security, more important than ever!
 
Web application penetration testing lab setup guide
Web application penetration testing lab setup guideWeb application penetration testing lab setup guide
Web application penetration testing lab setup guide
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
2016 Guide to User Data Security
2016 Guide to User Data Security2016 Guide to User Data Security
2016 Guide to User Data Security
 
InterConnect2016 Monitoring Nodejs
InterConnect2016 Monitoring NodejsInterConnect2016 Monitoring Nodejs
InterConnect2016 Monitoring Nodejs
 
ESM 5.5 Patch 1 Release Notes
ESM 5.5 Patch 1 Release NotesESM 5.5 Patch 1 Release Notes
ESM 5.5 Patch 1 Release Notes
 
Smart Printing Technical Presentation
Smart Printing Technical PresentationSmart Printing Technical Presentation
Smart Printing Technical Presentation
 
Microsoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform InstallerMicrosoft WebsiteSpark & Windows Platform Installer
Microsoft WebsiteSpark & Windows Platform Installer
 
OSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ InfosectrainOSCP Preparation Guide @ Infosectrain
OSCP Preparation Guide @ Infosectrain
 
Advanced deployment scenarios
Advanced deployment scenariosAdvanced deployment scenarios
Advanced deployment scenarios
 
Packet capture and network traffic analysis
Packet capture and network traffic analysisPacket capture and network traffic analysis
Packet capture and network traffic analysis
 
Glimpse of Loops Vs Set
Glimpse of Loops Vs SetGlimpse of Loops Vs Set
Glimpse of Loops Vs Set
 
Chicago ALM User Group - Nov 2014 - Application Insights 101
Chicago ALM User Group - Nov 2014 - Application Insights 101Chicago ALM User Group - Nov 2014 - Application Insights 101
Chicago ALM User Group - Nov 2014 - Application Insights 101
 
Advanced deployment scenarios (netcoreconf)
Advanced deployment scenarios (netcoreconf)Advanced deployment scenarios (netcoreconf)
Advanced deployment scenarios (netcoreconf)
 
unit5final
unit5finalunit5final
unit5final
 
The virtues of backup disaster recovery
The virtues of backup disaster recoveryThe virtues of backup disaster recovery
The virtues of backup disaster recovery
 
ESM 6.9.1c Patch1 Release Notes
	ESM 6.9.1c Patch1 Release Notes 	ESM 6.9.1c Patch1 Release Notes
ESM 6.9.1c Patch1 Release Notes
 

PALETTE BUSINESS SOLUTION DOCUMENTATION

  • 2. 2 | P a g e BUSINESS PROCESS GUIDES
  • 3. 3 | P a g e PROGRAM FLOW DESCRIPTIONS Please note we used virtualization because we believe every infrastructure/organization have virtual environment and as such we also covered same platform inclusive of mobile device, desktop, laptop, tablet etc.
  • 4. 4 | P a g e DATA MODEL DESCRIPTIONS
  • 5. 5 | P a g e SAMPLE REPORTS
  • 6. 6 | P a g e SCREEN FORMATS
  • 7. 7 | P a g e TOOLKIT GUIDES https://docs.s.kaspersky-labs.com/english/kes10sp1mr2_en.pdf https://docs.s.kaspersky-labs.com/english/kasp10_best_practicesen.pdf https://docs.s.kaspersky-labs.com/english/kasp10.0_sc_admguideen.pdf https://docs.s.kaspersky-labs.com/english/kasp10.0_sc_gsen.pdf https://docs.s.kaspersky-labs.com/english/kasp10.0_sp2_sc_implguideen.pdf https://docs.s.kaspersky-labs.com/english/kasp10.0_scwc_userguideen.pdf TROUBLESHOOTING GUIDES In Kaspersky Endpoint Security 10 for Windows SP1 Beta1 the following issues can be useful for trouble shooting.  In some cases, reports from Kaspersky Security Center contain non-localized events. This can be checked from the windows event logs and resolution traced.  In some cases, the product may crash when attempting to send a complaint on access to a web resource. This may be prohibited by the Web Control component and issue troubleshooted from same.  During installation, Kaspersky Endpoint Security removes Microsoft System Center upon recognizing it as incompatible software.  In some cases, decryption of files that have been encrypted with File Level Encryption (FLE) feature may consume up to 100% of CPU resources. This can be addressed, by checking task manager to see Kaspersky endpoint security avp.com utilization.  Some Microsoft updates cannot be installed when Kaspersky Endpoint Security is installed. This is can also be troubleshooted by checking if Kaspersky endpoint security solution has been successfully installed on client PCs as regards errors from WSUS server report.  In some cases, Network Agent may crash when starting the OS.  In some cases, the system may crash when installing Kaspersky Endpoint Security 10 Maintenance Release 1 for Windows.  Installing Kaspersky Endpoint Security on a server with the RRAS role results in a loss of Internet access by all hosts that use that server.  Local management of group tasks via avp.com does not function, though the corresponding permission is active in the policy.  Exclusions in <Disk name>:<File name> format are not supported.  Kaspersky Endpoint Security is incompatibility with some video drivers.  In some cases, installation of the application with install.cfg results in an incorrect behavior of the Web Anti-Virus component.  In some cases, the System Watcher component mistakenly blocks running applications located on network resources.  In some cases, the advanced disinfection procedure cannot disinfect objects in the system memory.  The application blocks access to flash drives that support the U3 formatting standard.  Network Attack Blocker: in some cases, hosts added as exclusions are blocked.  The application blocks the key shortcut Alt + Ctrl + Shift + P.  During upgrade for windows 10, Kaspersky endpoint security application is to be manually uninstalled as this may hinder installation of upgrade.
  • 8. 8 | P a g e FREQUENTLY ASKED QUESTION (FAQ) GUIDES Q: What is License information? A: License information is your product's unique identifier. Q: What is the difference between the License Number, Installed keys and License information? A: All these terms mean the same thing, i.e., License information. Different terms were used in different product versions. Q: Why do I have to renew my license? A: If your license has expired, you cannot receive up-to-date protection for your computer. Because thousands of new malicious programs appear every day, it would be virtually impossible to remain protected without regular antivirus database updates. That is why we strongly recommend that our customers renew their licenses before they expire. Q: When should I renew my license? A: It is best to renew your license no earlier than 14 days before the expiration date and no later than the date the license expires.