User guide
Welcome
1
Welcome
Endpoint Security Online User Assistance
Some things to keep in mind as you navigate online help:
Enable Internet Explorer to accept cookies and JavaScript.
Click to display context-sensitive help for the currently selected function.
Documentation
You can download a PDF version of the following documents. You must have Acrobat Reader installed
on your system to view the PDF files.
Endpoint Security User Guide
(http://help.kaseya.com/webhelp/EN/
KES/R8/EN_kesguide_R8.pdf#zoom=
70&navpanes=0)
This is the same content as the Endpoint
Security online user assistance.
Release Notes
(http://help.kaseya.com/webhelp/EN/
RN/R8/index.asp#KESReleaseNotes.h
tm)
This is the history of release changes for
Endpoint Security.
See online help and user guides for other products
(http://help.kaseya.com/WebHelp/EN/doc/R8/index.asp#home.htm).
This R8 version of Endpoint Security online user assistance was generated 12/17/2014.
Security Overview
Endpoint Security (KES) provides security protection for managed machines, using fully integrated
anti-malware technology from AVG Technologies. The term malware encompasses viruses, spyware,
adware and other types of unwanted programs. Endpoint Security automatically cleans or removes
infected files and other threats such as trojans, worms and spyware. Endpoint Security continuously
monitors the security status of all Windows servers, workstations and notebooks installed with security
protection. Alarms can be triggered by security protection events and can include sending email
notifications, running procedures, and creating job tickets.
Centrally managed security profiles are defined and deployed to machines using the VSA console
interface. Changes to a security profile automatically update all machines using that profile. Endpoint
Security comes with a pre-defined standard security profile and enables you to create customized
security profiles.
All security protection events are logged within the system and available for executive summary and
detailed management reporting. Once deployed, updates are handled automatically on a scheduled
basis without the need for user interaction.
Anti-Virus Protection
Based on the security profile, Endpoint Security removes infected files or blocks access to them:
Scans the system registry for suspicious entries, temporary internet files, tracking cookies, and other
types of unwanted objects.
Detects computer viruses by:
Scanning - Performs both on-access and on-demand scanning.
Heuristic Analysis - Dynamically emulates a scanned object’s instructions within a virtual
computing environment.