User's Manual

Contents
CHAPTER 1. KASPERSKY ADMINISTRATION KIT .................................................... 6
1.1. About Kaspersky Administration Kit...................................................................... 6
1.2. Hardware and software requirements .................................................................. 7
1.3. Distribution kit ........................................................................................................ 9
1.4. Help desk for registered users.............................................................................. 9
1.5. The purpose of the document............................................................................... 9
1.6. Conventions......................................................................................................... 10
CHAPTER 2. UNDERSTANDING KASPERSKY ADMINISTRATION KIT ................ 11
2.1. Logical network.................................................................................................... 11
2.1.1. Logical network. Administration Server........................................................ 11
2.1.2. Hierarchy of the Administration servers....................................................... 12
2.1.3. Client computer. Group ................................................................................ 12
2.1.4. Administrator's workstations......................................................................... 14
2.1.5. Application administration plug-in................................................................. 14
2.1.6. Policies, settings, and tasks ......................................................................... 14
2.1.7. Relationship between the policies and the local application settings ......... 17
2.2. Connecting clients to the Administration server ................................................. 18
2.3. Secure connection to the Administration Server................................................ 19
2.3.1. Administration Server certificate................................................................... 19
2.3.2. Administration Server authentication (when the Administration Console
connects to the server) ................................................................................. 20
2.3.3. Administration Server authentication when establishing connection with
a client ........................................................................................................... 20
2.4. Identification of computers on the logical network.............................................. 20
2.5. Logical network access rights............................................................................. 21
2.6. Deployment of anti-virus protection over logical network computers ................ 23
2.7. Building a centralized anti-virus protection administration system .................... 23
2.8. Maintaining a logical network.............................................................................. 25
2.9. Coordinating joint operation of administrators.................................................... 25
2.10. User interface .................................................................................................... 25
2.10.1. Launching the application........................................................................... 26