User Guide

CHAPTER 1. KASPERSKY
®
ADMINISTRATION KIT
Kaspersky
®
Administration Kit was developed specially for administrators of
corporate networks or anti-virus security officers. Using this toolkit, a network
administrator can manage anti-virus protection (i.e. install, configure, and update
the Kaspersky Anti-Virus
®
software, and also quickly and efficiently deal with
virus outbreaks) SIMULTANEOUSLY on all workstations of a corporate network
DIRECTLY FROM THE ADMINISTRATING STATION.
Kaspersky
®
Administration Kit enables an administrator to:
Remotely manage anti-virus settings across a corporate network. The
administrator can remotely manage anti-virus tools installed on other net-
work computers from one location. Remote management is especially im-
portant for administrators of large networks that cover more then one
building or office.
Remotely install (deploy) anti-virus software on workstations
. This feature
facilitates creating of a unified anti-virus protection system across a net-
work. The administrator downloads the Kaspersky Anti-Virus
®
package on
his computer (or a dedicated server) only once and then deploys it to the
workstations that are connected to the network.
Remotely launch scheduled or on-demand scans
. This feature allows the
administrator to remotely launch scans on workstations and schedule the
scanning procedure to be automatically started at a specified time.
Automatically update anti-virus databases on workstations. Updating of
anti-virus databases can be performed centrally: you do not need every
workstation to connect to the Kaspersky Labs web server. The updating
procedure can also be scheduled to run automatically on a regular basis.
Receive the cumulative network report
. The network report logs all events
detected by the anti-virus software on all protected workstations. The ad-
ministrator can also request reports from individual workstations.
Customize the notification system
. This feature allows the administrator to
define a list of events to be notified about by e-mail. For example, these
can be a detection of a virus on the protected network or an unsuccessful
attempt to update anti-virus databases on a workstation.
Quarantine suspicious files.
The administrator can centrally store suspi-
cious files, encode them, and move them to the server quarantine. This
enables the administrator to maintain the highest level of anti-virus protec-