Contents
- Managing third-party applications on client devices
- Limitations of Vulnerability and patch management
- Availability of Vulnerability and patch management features in trial and commercial mode and under various licensing options
- About third-party applications
- Third-party software updates
- Scenario: Updating third-party software
- Installing third-party software updates
- Creating the Find vulnerabilities and required updates task
- Find vulnerabilities and required updates task settings
- Creating the Install required updates and fix vulnerabilities task
- Adding rules for update installation
- Creating the Install Windows Update updates task
- Viewing information about available third-party software updates
- Exporting the list of available software updates to a file
- Approving and declining third-party software updates
- Updating third-party applications automatically
- Finding and fixing software vulnerabilities
- Fixing software vulnerabilities
- Creating the Fix vulnerabilities task
- Creating the Install required updates and fix vulnerabilities task
- Adding rules for update installation
- Viewing information about software vulnerabilities detected on all managed devices
- Viewing information about software vulnerabilities detected on the selected managed device
- Viewing statistics of vulnerabilities on managed devices
- Exporting the list of software vulnerabilities to a file
- Ignoring software vulnerabilities
- Scenario: Finding and fixing software vulnerabilities
- Setting the maximum storage period for the information about fixed vulnerabilities
- Managing applications run on client devices
- Using Application Control to manage executable files
- Application Control modes and categories
- Obtaining and viewing a list of applications installed on client devices
- Obtaining and viewing a list of executable files installed on client devices
- Creating application category with content added manually
- Creating application category that includes executable files from selected devices
- Viewing the list of application categories
- Configuring Application Control in the Kaspersky Endpoint Security for Windows policy
- Adding event-related executable files to the application category
- Creating an installation package of a third-party application from the Kaspersky database
- Viewing and modifying the settings of an installation package of a third-party application from the Kaspersky database
- Settings of an installation package of a third-party application from the Kaspersky database
- Application tags
Managing third-party applications on client devices
This section describes the features of Kaspersky Security Center Cloud Console that are related to the management of third-party applications installed on client devices.
Limitations of Vulnerability and patch management
The Vulnerability and patch management feature has a number of limitations, depending on the license that you use and the mode in which Kaspersky Security Center Cloud Console is working.
The following licenses do not support Vulnerability and patch management:
- Kaspersky Endpoint Security for Business Select
- Kaspersky Hybrid Cloud Security
The following licenses support Vulnerability and patch management:
- Kaspersky Endpoint Security for Business Advanced
- Kaspersky Endpoint Detection and Response Optimum
- Kaspersky Total Security for Business
- Kaspersky Hybrid Cloud Security Enterprise
The table below compares limitations of Kaspersky Security Center Cloud Console in the trial mode, under licenses that do not support Vulnerability and patch management, and under licenses that support Vulnerability and patch management.
Limitations of Vulnerability and patch management
Limitation |
Trial mode |
Commercial mode: licenses that do not support Vulnerability and patch management |
Commercial mode: licenses that support Vulnerability and patch management |
Maximum number of the Install Windows Update updates tasks or the Fix vulnerabilities tasks |
4 |
4 |
0 (new tasks of these types cannot be created) |
Maximum number of the Install required updates and fix vulnerabilities tasks |
2 |
Not supported |
4 |
Maximum number of rules in all of the Install required updates and fix vulnerabilities tasks |
10 |
Not supported |
50 |
Maximum number of software updates that can have the Approved status at the same time, across all servers including virtual ones |
100 |
Not supported |
1000 |
Maximum number of software updates that can be manually added to a task, across all servers including virtual ones |
500 |
1000 |
1000 |
Maximum number of software vulnerabilities that can be manually added to a task, across all servers including virtual ones |
500 |
1000 |
1000 |
Availability of Vulnerability and patch management features in trial and commercial mode and under various licensing options
The availability of Vulnerability and patch management features in Kaspersky Security Center Cloud Console depends on whether you use it in trial or commercial mode, as well as on the licensing option that you selected. Use the table to check which Vulnerability and patch management features are available.
Availability of Vulnerability and patch management features
Vulnerability and patch management feature |
Trial mode |
Commercial mode: Kaspersky Endpoint Security for Business Select |
Commercial mode: Kaspersky Endpoint Security for Business Advanced, Kaspersky Endpoint Detection and Response Optimum, Kaspersky Total Security for Business |
Manual fixing of vulnerabilities in Microsoft software on managed devices that are running Windows Creating the Fix vulnerabilities task |
|||
Manual installation of updates in Microsoft software on managed devices that are running Windows Installing third-party software updates through the Install Windows Update updates task |
|||
Automatic rule-based installing third-party software updates and fixing of third-party software vulnerabilities Creating the Install required updates and fix vulnerabilities task and installing updates |
About third-party applications
Kaspersky Security Center Cloud Console can help you to update third-party software, installed on client devices, and fix the vulnerabilities of the third-party software. Kaspersky Security Center Cloud Console can update third-party software from the current version to the latest version only.
The list of third-party software can be updated and extended with new applications. You can check whether you can update the third-party software (installed on users' devices) with Kaspersky Security Center Cloud Console by viewing the list of available updates in Kaspersky Security Center Cloud Console.
The procedure outlined below is intended solely for viewing the list of third-party software that can be updated with Kaspersky Security Center Cloud Console. The steps are followed to access the relevant information without initiating any tasks.
To view the list of third-party software that you can update with Kaspersky Security Center Cloud Console:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Proceed through the wizard by using the Next button.
- At the New task settings step of the wizard, specify the following settings:
- In the Application drop-down list, select Kaspersky Security Center Cloud Console.
- In the Task type field, select Install required updates and fix vulnerabilities.
- At the Task scope step of the wizard, select the Managed Devices option.
- At the Specify rules for installing updates step of the wizard, click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- At the Select rule type step of the wizard, select the Rule for third-party updates option.
- At the General criteria step of the wizard, select the Install all updates (except declined) option, and then click Next.
The list of third-party software is displayed.
Third-party software updates
Kaspersky Security Center Cloud Console enables you to manage updates of third-party software installed on managed devices and fix vulnerabilities in Microsoft applications and other software makers' products through installation of required updates.
Kaspersky Security Center Cloud Console searches for updates through the Find vulnerabilities and required updates task. When this task is complete, Administration Server receives the lists of detected vulnerabilities and required updates for the third-party software installed on the devices that you specified in the task properties. After viewing information about available updates, you can install them on devices.
Kaspersky Security Center Cloud Console updates some applications by removing the previous version of the application and installing the new one.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it is currently open.
For security reasons, any third-party software updates that you install by using the Vulnerability and patch management feature are automatically scanned for malware by Kaspersky technologies. These technologies are used for automatic file checks and include virus scanning, static analysis, dynamic analysis, behavior analysis in the sandbox environment, and machine learning.
Kaspersky experts do not perform manual analysis of third-party software updates that can be installed by using the Vulnerability and patch management feature. In addition, Kaspersky experts do not search for vulnerabilities (known or unknown) or undocumented features in such updates, nor do they perform other types of analysis of the updates other than those specified in the paragraph above.
Tasks for installation of third party software updates
When metadata of the third-party software updates is downloaded to the repository, you can install the updates on client devices by using the following tasks:
- The Install required updates and fix vulnerabilities task
This task is used to install updates for Microsoft applications, including the updates provided by the Windows Update service, and updates of other vendors' software.
When this task is complete, the updates are installed on the managed devices automatically. When metadata of new updates is downloaded to the Administration Server repository, Kaspersky Security Center Cloud Console checks whether the updates meet the criteria specified in the update rules. All new updates that meet the criteria will be downloaded and installed automatically at the next task run.
- The Install Windows Update updates task
This task can be used to install Windows Update updates only.
When this task is complete, only those updates that are specified in the task properties are installed. In future, if you want to install new updates, you must add the required updates to the list of updates in the existing task or create an Install Windows Update updates task.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
Scenario: Updating third-party software
This section provides a scenario for updating third-party software installed on the client devices. The third-party software includes applications from Microsoft and other software vendors. Updates for Microsoft applications are provided by the Windows Update service.
Stages
Updating third-party software proceeds in stages:
- Searching for required updates
To find the third-party software updates required for the managed devices, run the Find vulnerabilities and required updates task. When this task is complete, Kaspersky Security Center Cloud Console receives the lists of detected vulnerabilities and required updates for the third-party software installed on the devices that you specified in the task properties.
The Find vulnerabilities and required updates task is created automatically by the Administration Server quick start wizard. If you did not run the wizard, create the task or run the quick start wizard now.
How-to instructions:
- Analyzing the list of found updates
View the Software updates list and decide which updates you want to install. To view detailed information about each update, click the update name in the list. For each update in the list, you can view the statistics about the update installation on managed devices. For example, you can view the number of devices on which the selected update is not installed, will be installed, or on which the update installation has failed.
How-to instructions: Viewing information about available third-party software updates
- Configuring installation of updates
When Kaspersky Security Center Cloud Console received the list of the third-party software updates, you can install them on client devices by using the Install required updates and fix vulnerabilities task or the Install Windows Update updates task. Create one of these tasks. You can create these tasks on the Tasks tab or by using the Software updates list.
The Install required updates and fix vulnerabilities task is used to install updates for Microsoft applications, including the updates provided by the Windows Update service, and updates of other vendors' software.
The Install Windows Update updates task can be used to install Windows Update updates only.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
To install some software updates you must accept the End User License Agreement (EULA) for the installation software. If you decline the EULA, the software update will not be installed.
How-to instructions:
- Scheduling the tasks
To be sure that the update list is always up-to-date, schedule the Find vulnerabilities and required updates task to run the task automatically from time to time. The default frequency is once a week.
If you have created the Install required updates and fix vulnerabilities task, you can schedule it to run with the same frequency as the Find vulnerabilities and required updates task or less often. When scheduling the Install Windows Update updates task, note that for this task you must define the list of updates every time before starting this task.
When scheduling the tasks, make sure that a task to fix vulnerability starts after the Find vulnerabilities and required updates task is complete.
How-to instructions: General task settings
- Approving and declining software updates (optional)
If you have created the Install required updates and fix vulnerabilities task, you can specify rules for update installation in the task properties. If you have created the Install Windows Update updates task, skip this step.
For each rule, you can define the updates to install depending on the update status: Undefined, Approved or Declined. For example, you may want to create a specific task for servers and set a rule for this task to allow installation of only Windows Update updates and only those ones that have Approved status. After that you manually set the Approved status for those updates that you want to install. In this case the Windows Update updates that have the Undefined or Declined status will not be installed on the servers that you specified in the task.
By default, the downloaded software updates have the Undefined status. You can change the status to Approved or Declined in the Software updates list (Operations → Patch management → Software updates).
How-to instructions: Approving and declining third-party software updates
- Running an update installation task
Start the Install required updates and fix vulnerabilities task or the Install Windows Update updates task. When you start these tasks, updates are downloaded and installed on managed devices. After the task is complete, make sure that it has the Completed successfully status in the task list.
How-to instructions: Starting a task manually
- Create the report on results of update installation of third-party software (optional)
To make sure that the task is created and the updates are installed, create the Report on results of installation of third-party software updates and view detailed statistics on the update installation in this report.
How-to instructions: Generating and viewing a report
Installing third-party software updates
You can install third-party software updates on managed devices by creating and running one of the following tasks:
- Install required updates and fix vulnerabilities
You can use this task to install both Windows Update updates provided by Microsoft and updates of other vendors' software.
- Install Windows Update updates
You can use this task to install Windows Update updates only.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it is currently open.
As an option, you can create a task to install the required updates in the following ways:
- By opening the update list and specifying which updates to install.
As a result, a new task to install the selected updates is created. As an option, you can add the selected updates to an existing task.
- By running the Update installation wizard.
The availability of the Update installation wizard depends on the Kaspersky Security Center Cloud Console mode and your current license.
The wizard simplifies creation and configuration of an update installation task, and enables you to eliminate the creation of redundant tasks that contain the same updates to install.
Installing third-party software updates by using the update list
To install third-party software updates by using the list of updates:
- Open one of the lists of updates:
- To open the general update list, in the main menu, go to Operations → Patch management → Software updates.
- To open the update list for a managed device, in the main menu, go to Assets (Devices) → Managed devices → <device name> → Advanced → Available updates.
- To open the update list for a specific application, in the main menu, go to Operations → Third-party applications → Applications registry → <application name> → Available updates.
A list of available updates appears.
- Select the check boxes next to the updates that you want to install.
- Click the Install updates button.
To install some software updates, you must accept the End User License Agreement (EULA). If you decline the EULA, the software update will not be installed.
- Select one of the following options:
- New task
The New task wizard starts. The Install required updates and fix vulnerabilities task or the Install Windows Update updates task is preselected, depending on the Kaspersky Security Center Cloud Console mode and your current license. Follow the steps of the wizard to complete the task creation.
- Install update (add rule to specified task)
Select a task to which you want to add the selected updates. Select an Install required updates and fix vulnerabilities task or an Install Windows Update updates task. If you select an Install required updates and fix vulnerabilities task, a new rule to install the selected updates will be automatically added to the selected task. If you select an Install Windows Update updates task, the selected updates will be added to the task properties.
The task properties window opens. Click the Save button to save the changes.
- New task
If you have chosen to create a task, the task is created and displayed in the task list at Assets (Devices) → Tasks. If you have chosen to add the updates to an existing task, the updates are saved in the task properties.
To install third-party software updates, start the Install required updates and fix vulnerabilities task or the Install Windows Update updates task. You can start any of these tasks manually or specify schedule settings in the properties of the task that you start. When specifying the task schedule, make sure that the update installation task starts after the Find vulnerabilities and required updates task is complete.
Installing third-party software updates by using the Update installation wizard
The availability of this feature depends on the Kaspersky Security Center Cloud Console mode and your current license.
To create a task to install third-party software updates by using the Update installation wizard:
- In the main menu, go to Operations → Patch management → Software updates.
A list of available updates appears.
- Select the check box next to the update that you want to install.
- Click the Run Update installation wizard button.
The Update installation wizard starts. The Select the update installation task page displays the list of all existing tasks of the following types:
- Install required updates and fix vulnerabilities
- Install Windows Update updates
- Fix vulnerabilities
You cannot modify the tasks of the last two types to install new updates. To install new updates, you can only use the Install required updates and fix vulnerabilities tasks.
- If you want the wizard to display only those tasks that install the update that you selected, then enable the Show only tasks that install this update option.
- Choose what you want to do:
- To start a task, select the check box next to the task name, and then click the Start button.
- To add a new rule to an existing task:
- Select the check box next to the task name, and then click the Add rule button.
- On the page that opens, configure the new rule:
- Installation rule for updates of this importance level
- Installation rule for updates of this importance level according to MSRC (available only for Windows Update updates)
- Installation rule for updates by this vendor (available only for updates of third-party applications)
- Installation rule for updates of the type
- Installation rule for the selected update
- Approve selected updates
- Automatically install all previous application updates that are required to install the selected updates
- Click the Add button.
- To create a task:
- Click the New task button.
- On the page that opens, configure the new rule:
- Installation rule for updates of this importance level
- Installation rule for updates of this importance level according to MSRC (available only for Windows Update updates)
- Installation rule for updates by this vendor (available only for updates of third-party applications)
- Installation rule for updates of the type
- Installation rule for the selected update
- Approve selected updates
- Automatically install all previous application updates that are required to install the selected updates
- Click the Add button.
If you have chosen to start a task, you can close the wizard. The task will complete in background mode. No further actions are required.
If you have chosen to add a rule to an existing task, the task properties window opens. The new rule is already added to the task properties. You can view or modify the rule or other task settings. Click the Save button to save the changes.
If you have chosen to create a task, you continue to create the task in the New task wizard. The new rule that you added in the Update installation wizard is displayed in the New task wizard. When you complete the New task wizard, the Install required updates and fix vulnerabilities task is added to the task list.
Creating the Find vulnerabilities and required updates task
Through the Find vulnerabilities and required updates task, Kaspersky Security Center Cloud Console receives the lists of detected vulnerabilities and required updates for the third-party software installed on the managed devices.
The Find vulnerabilities and required updates task is created automatically when the quick start wizard is running. If you did not run the wizard, you can create the task manually.
To create the Find vulnerabilities and required updates task:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Follow the steps of the wizard.
- For the Kaspersky Security Center Cloud Console application, select the Find vulnerabilities and required updates task type.
- Specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- Select devices to which the task will be assigned.
- If you want to modify the default task settings, enable the Open task details when creation is complete option on the Finish task creation page. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
- Click the Create button.
The task is created and displayed in the list of tasks.
- Click the name of the created task to open the task properties window.
- In the task properties window, specify the general task settings.
- On the Application settings tab, specify the following settings:
- Search for vulnerabilities and updates listed by Microsoft
- Connect to the update server to update data
- Search for third-party vulnerabilities and updates listed by Kaspersky
- Specify paths for advanced search of applications across the file system
- Enable advanced diagnostics
- Maximum size, in MB, of advanced diagnostics files
- Click the Save button.
The task is created and configured.
If the task results contain a warning of the 0x80240033 "Windows Update Agent error 80240033 ("License terms could not be downloaded.")" error, you can resolve this issue through the Windows Registry.
Find vulnerabilities and required updates task settings
The Find vulnerabilities and required updates task is created automatically when the quick start wizard is running. If you did not run the wizard, you can create the task manually.
In addition to the general task settings, you can specify the following settings when creating the Find vulnerabilities and required updates task or later, when configuring the properties of the created task:
- Search for vulnerabilities and updates listed by Microsoft
- Connect to the update server to update data
- Search for third-party vulnerabilities and updates listed by Kaspersky
- Specify paths for advanced search of applications across the file system
- Enable advanced diagnostics
- Maximum size, in MB, of advanced diagnostics files
Recommendations on the task schedule
When scheduling the Find vulnerabilities and required updates task, make sure that two options—Run missed tasks and Use automatically randomized delay for task starts—are enabled.
By default, the Find vulnerabilities and required updates task is set to start manually. If the organization's workplace rules provide for shutting down all devices at this time, the Find vulnerabilities and required updates task will run after the devices are turned on again, that is, in the morning of the next day. Such activity may be undesirable because a vulnerability scan may increase the load on CPUs and disk subsystems. You must set up the most convenient schedule for the task based on the workplace rules adopted in the organization.
Creating the Install required updates and fix vulnerabilities task
The availability of the Install required updates and fix vulnerabilities task depends on the Kaspersky Security Center Cloud Console mode and your current license.
The Install required updates and fix vulnerabilities task is used to update and fix vulnerabilities in third-party software, including Microsoft software, installed on the managed devices. This task enables you to install multiple updates and fix multiple vulnerabilities according to certain rules.
To install updates or fix vulnerabilities by using the Install required updates and fix vulnerabilities task, you can do one of the following:
- Run the Update installation wizard or the Vulnerability fix wizard.
- Create an Install required updates and fix vulnerabilities task.
- Add a rule for update installation to an existing Install required updates and fix vulnerabilities task.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
To create the Install required updates and fix vulnerabilities task:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Follow the steps of the wizard.
- For the Kaspersky Security Center Cloud Console application, select the Install required updates and fix vulnerabilities task type.
- Specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- Select devices to which the task will be assigned.
- Specify the rules for update installation, and then specify the following settings:
- Start installation at device restart or shutdown
- Install the required general system components
- Allow installation of new application versions during updates
- Download updates to the device without installing them
- Download updates to
- Enable advanced diagnostics
- Maximum size, in MB, of advanced diagnostics files
- Specify operating system restart settings:
- If on the Finish task creation page you enable the Open task details when creation is complete option, you can modify the default task settings. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
- Click the Finish button.
The task is created and displayed in the list of tasks.
- Click the name of the created task to open the task properties window.
- In the task properties window, specify the general task settings according to your needs.
- Click the Save button.
The task is created and configured.
If the task results contain a warning of the 0x80240033 "Windows Update Agent error 80240033 ("License terms could not be downloaded.")" error, you can resolve this issue through the Windows Registry.
Adding rules for update installation
The availability of this feature depends on the Kaspersky Security Center Cloud Console mode and your current license.
When installing software updates or fixing software vulnerabilities by using the Install required updates and fix vulnerabilities task, you must specify rules for the update installation. These rules determine the updates to install and the vulnerabilities to fix.
The exact settings depend on whether you add a rule for all updates, for Windows Update updates, or for updates of third-party applications (applications made by software vendors other than Kaspersky and Microsoft). When adding a rule for Windows Update updates or updates of third-party applications, you can select specific applications and application versions for which you want to install updates. When adding a rule for all updates, you can select specific updates that you want to install and vulnerabilities that you want to fix by means of installing updates.
You can add a rule for update installation in the following ways:
- By adding a rule while creating a new Install required updates and fix vulnerabilities task.
- By adding a rule on the Application Settings tab in the properties window of an existing Install required updates and fix vulnerabilities task.
- Through the Update installation wizard or the Vulnerability fix wizard.
To add a new rule for all updates:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for all updates.
- On the General criteria page, use the drop-down lists to specify the following settings:
- On the Updates page, select the updates to be installed:
- On the Vulnerabilities page, select vulnerabilities that will be fixed by installing the selected updates:
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
To add a new rule for Windows Update updates:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for Windows Update.
- On the General criteria page, specify the following settings:
- On the Applications page, select the applications and application versions for which you want to install updates. By default, all applications are selected.
- On the Categories of updates page, select the categories of updates to be installed. These categories are the same as in Microsoft Update Catalog. By default, all categories are selected.
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
To add a new rule for updates of third-party applications:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for third-party updates.
- On the General criteria page, specify the following settings:
- On the Applications page, select the applications and application versions for which you want to install updates. By default, all applications are selected.
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
Creating the Install Windows Update updates task
The Install Windows Update updates task enables you to install software updates provided by the Windows Update service on client devices.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
To create the Install Windows Update updates task:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Proceed through the wizard by using the Next button.
- For the Kaspersky Security Center Cloud Console application, select the Install Windows Update updates task type.
- Specify the name for the task that you are creating.
A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- Select devices to which the task will be assigned.
- Click the Add button.
The list of updates opens.
- Select the Windows Update updates that you want to install, and then click OK.
- Specify the operating system restart settings:
- Specify the account settings:
- If you want to modify the default task settings, enable the Open task details when creation is complete option on the Finish task creation page. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
- Click the Finish button.
The task is created and displayed in the list of tasks.
- Click the name of the created task to open the task properties window.
- In the task properties window, specify the general task settings according to your needs.
- Click the Save button.
The task is created and configured.
Viewing information about available third-party software updates
You can view the list of available updates for third-party software, including Microsoft software, installed on client devices.
To view a list of available updates for third-party applications installed on client devices,
In the main menu, go to Operations → Patch management → Software updates.
A list of available updates appears.
You can specify a filter to view the list of software updates. Click the Filter icon () in the upper right corner of the software updates list to manage the filter. You can also select one of preset filters from the Preset filters drop-down list above the software vulnerabilities list.
To view the properties of an update:
- Click the name of the required software update.
- The properties window of the update opens, displaying information grouped on the following tabs:
To view the statistics of an update installation:
- Select the check box next to the required software update.
- Click the Statistics of update installation statuses button.
The diagram of the update installation statuses is displayed. Clicking a status opens a list of devices on which the update has the selected status.
You can view information about available software updates for third-party software, including Microsoft software, installed on the selected managed device running Windows.
To view a list of available updates for third-party software installed on the selected managed device:
- In the main menu, go to Assets (Devices) → Managed devices.
The list of managed devices is displayed.
- In the list of managed devices, click the link with the name of the device for which you want to view third-party software updates.
The properties window of the selected device is displayed.
- In the properties window of the selected device, select the Advanced tab.
- In the left pane, select the Available updates section. If you want to view only installed updates, enable the Show installed updates option.
The list of available third-party software updates for the selected device is displayed.
Exporting the list of available software updates to a file
You can export the list of updates for third-party software, including Microsoft software, that is displayed at the moment to the CSV or TXT files. You can use these files, for example, to send them to your information security manager or to store them for purposes of statistics.
To export to a text file the list of available updates for third-party software installed on all managed devices:
- In the main menu, go to Operations → Patch management → Software updates.
The page displays a list of available updates for third-party software installed on all managed devices.
- Click the Export to TXT or Export to CSV button, depending on the format you prefer for export.
The file containing the list of available updates for third-party software, including Microsoft software, is downloaded to the device that you use at the moment.
To export to a text file the list of available updates for third-party software installed on the selected managed device:
- Open the list of available third-party software updates on the selected managed device.
- Select the software updates you want to export.
Skip this step if you want to export a complete list of software updates.
If you want to export a complete list of software updates, only updates displaying on the current page will be exported.
If you want to export only installed updates, select the Show installed updates check box.
- Click the Export to TXT or Export to CSV button, depending on the format you prefer for export.
The file containing the list of updates for third-party software, including Microsoft software, installed on the selected managed device is downloaded to the device you are using at the moment.
Approving and declining third-party software updates
When you configure the Install required updates and fix vulnerabilities task, you can create a rule that requires a specific status of updates that are to be installed. For example, an update rule can allow installation of the following:
- Only approved updates
- Only approved and undefined updates
- All updates irrespective of the update statuses
You can approve updates that must be installed and decline updates that must not be installed.
The usage of the Approved status to manage update installation is efficient for a small amount of updates. To install multiple updates, use the rules that you can configure in the Install required updates and fix vulnerabilities task. We recommend that you set the Approved status for only those specific updates that do not meet the criteria specified in the rules. When you manually approve a large amount of updates, performance of Administration Server decreases and may lead to Administration Server overload.
To approve or decline one or several updates:
- In the main menu, go to Operations → Patch management → Software updates.
A list of available updates appears.
- Select the updates that you want to approve or decline.
- Click Approve to approve the selected updates or Decline to decline the selected updates.
The default value is Undefined.
The selected updates have the statuses that you defined.
As an option, you can change the approval status in the properties of a specific update.
To approve or decline an update in its properties:
- In the main menu, go to Operations → Patch management → Software updates.
A list of available updates appears.
- Click the name of the update that you want to approve or decline.
The update properties window opens.
- In the General section, select a status for the update by changing the Update approval status option. You can select the Approved, Declined, or Undefined status.
- Click the Save button to save the changes.
The selected update has the status that you defined.
If you set Declined status for third-party software updates, these updates will not be installed on devices for which they were planned but have not yet been installed. Updates will remain on devices on which they were already installed. If you have to delete them, you can manually delete them locally.
Updating third-party applications automatically
Some third-party applications can be updated automatically. The application vendor defines whether or not the application supports the auto-update feature. If a third-party application installed on a managed device supports auto-update, you can specify the auto-update setting in the application properties. After you change the auto-update setting, Network Agents apply the new setting on each managed device on which the application is installed.
The auto-update setting is independent of the other objects and settings of the Vulnerability and patch management feature. For example, this setting does not depend on an update approval status or the update installation tasks, such as Install required updates and fix vulnerabilities, Install Windows Update updates, and Fix vulnerabilities.
To configure the auto-update setting for a third-party application:
- In the main menu, go to Operations → Third-party applications → Applications registry.
- Click the name of the application for which you want to change the auto-update setting.
To simplify the search, you can filter the list by the Automatic Updates status column.
The application properties window opens.
- In the General section, select a value for the following setting:
- Click the Save button to save the changes.
The auto-update setting is applied to the selected application.
Finding and fixing software vulnerabilities
Kaspersky Security Center Cloud Console detects and fixes software
on managed devices running Microsoft Windows families operating systems. Vulnerabilities are detected in the operating system and in third-party software, including Microsoft software.Updates functionality (including providing anti-virus signature updates and codebase updates), as well as KSN functionality may not be available in the software in the U.S.
Finding software vulnerabilities
To find software vulnerabilities Kaspersky Security Center Cloud Console uses characteristics from the database of known vulnerabilities and Windows Update Database. The database of known vulnerabilities is created and maintained by Kaspersky specialists. It contains information about vulnerabilities, such as vulnerability description, vulnerability detect date, vulnerability severity level. You can find the details of software vulnerabilities on Kaspersky website.
Kaspersky Security Center Cloud Console uses the Find vulnerabilities and required updates task to find software vulnerabilities.
Fixing software vulnerabilities
To fix software vulnerabilities, Kaspersky Security Center Cloud Console uses software updates issued by the software vendors. You can view the list of software vulnerabilities at any time. The software updates metadata is downloaded to the Administration Server repository automatically and to the repositories of distribution points as a result of the Download updates to the repositories of distribution points task run. You can create this task by the Kaspersky Security Center Cloud Console quick start wizard or manually.
Software updates to fix vulnerabilities can be represented as full distribution packages or patches. Software updates that fix software vulnerabilities are named fixes. In Kaspersky Security Center Cloud Console, you fix vulnerabilities by using recommended fixes. Recommended fixes are software updates that are recommended for installation by Kaspersky specialists.
Depending on the Kaspersky Security Center Cloud Console mode and your current license, you can use Install required updates and fix vulnerabilities task or the Fix vulnerabilities task to fix software vulnerabilities.
The Install required updates and fix vulnerabilities task automatically fixes multiple vulnerabilities installing recommended fixes. For this task, you can manually configure certain rules to fix multiple vulnerabilities.
By means of the Fix vulnerabilities task, you can fix vulnerabilities by installing recommended fixes for Microsoft software.
For security reasons, any third-party software updates that you install by using the Vulnerability and patch management feature are automatically scanned for malware by Kaspersky technologies. These technologies are used for automatic file checks and include virus scanning, static analysis, dynamic analysis, behavior analysis in the sandbox environment, and machine learning.
Kaspersky experts do not perform manual analysis of third-party software updates that can be installed by using the Vulnerability and patch management feature. In addition, Kaspersky experts do not search for vulnerabilities (known or unknown) or undocumented features in such updates, nor do they perform other types of analysis of the updates other than those specified in the paragraph above.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it is currently open.
To fix some software vulnerabilities, you must accept the End User License Agreement (EULA) for installing the software if EULA acceptance is requested. If you decline EULA, the software vulnerability cannot be fixed.
The information about each fixed vulnerability is stored on the Administration Server for 90 days. After this time, it is automatically deleted.
Fixing software vulnerabilities
After you obtain the software vulnerabilities list, you can fix software vulnerabilities on managed devices that are running Windows. You can fix software vulnerabilities in the operating system and in third-party software, including Microsoft software, by creating and running the Fix vulnerabilities task or the Install required updates and fix vulnerabilities task.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it is currently open.
As an option, you can create a task to fix software vulnerabilities in the following ways:
- By opening the vulnerability list and specifying which vulnerabilities to fix.
As a result, a new task to fix software vulnerabilities is created. As an option, you can add the selected vulnerabilities to an existing task.
- By running the Vulnerability fix wizard.
The availability of this feature depends on the Kaspersky Security Center Cloud Console mode and your current license.
The wizard simplifies creation and configuration of a vulnerability fix task and enables you to eliminate the creation of redundant tasks that contain the same updates to install.
Fixing software vulnerabilities by using the vulnerability list
To fix software vulnerabilities:
- Open one of the lists of vulnerabilities:
- To open the general vulnerability list, in the main menu, go to Operations → Patch management → Software vulnerabilities.
- To open the vulnerability list for a managed device, in the main menu, go to Assets (Devices) → Managed devices → <device name> → Advanced → Software vulnerabilities.
- To open the vulnerability list for a specific application, in the main menu, go to Operations → Third-party applications → Applications registry → <application name> → Vulnerabilities.
A page with a list of vulnerabilities in the third-party software is displayed.
- Select one or more vulnerabilities in the list, and then click the Fix vulnerability button.
If a recommended software update to fix one of the selected vulnerabilities is absent, an informative message is displayed.
To fix some software vulnerabilities, you must accept the End User License Agreement (EULA) for installing the software if EULA acceptance is requested. If you decline the EULA, the software vulnerability is not fixed.
- Select one of the following options:
- New task
The New task wizard starts. Depending on the Kaspersky Security Center Cloud Console mode and your current license, the Install required updates and fix vulnerabilities task or the Fix vulnerabilities task is preselected. Follow the steps of the wizard to complete the task creation.
- Fix vulnerability (add rule to specified task)
Select a task to which you want to add the selected vulnerabilities. Depending on the Kaspersky Security Center Cloud Console mode and your current license, select an Install required updates and fix vulnerabilities task or a Fix vulnerabilities task. If you select an Install required updates and fix vulnerabilities task, a new rule to fix the selected vulnerabilities will be automatically added to the selected task. If you select a Fix vulnerabilities task, the selected vulnerabilities will be added to the task properties.
The task properties window opens. Click the Save button to save the changes.
- New task
If you have chosen to create a task, the task is created and displayed in the task list at Assets (Devices) → Tasks. If you have chosen to add the vulnerabilities to an existing task, the vulnerabilities are saved in the task properties.
To fix the third-party software vulnerabilities, start the Install required updates and fix vulnerabilities task or the Fix vulnerabilities task. If you have created the Fix vulnerabilities task, you must manually specify the software updates to fix the software vulnerabilities listed in the task settings.
Fixing software vulnerabilities by using the Vulnerability fix wizard
The availability of the Vulnerability fix wizard depends on the license that you use and the mode in which Kaspersky Security Center Cloud Console is working.
To fix software vulnerabilities by using the Vulnerability fix wizard:
- In the main menu, go to Operations → Patch management → Software vulnerabilities.
A page with a list of vulnerabilities in the third-party software installed on managed devices is displayed.
- Select the check box next to the vulnerability that you want to fix.
- Click the Run Vulnerability fix wizard button.
The Vulnerability fix wizard starts. The Select the vulnerability fix task page displays the list of all existing tasks of the following types:
- Install required updates and fix vulnerabilities
- Install Windows Update updates
- Fix vulnerabilities
You cannot modify the last two types of tasks to install new updates. To install new updates, you can only use the Install required updates and fix vulnerabilities task.
- If you want the wizard to display only those tasks that fix the vulnerability that you selected, then enable the Show only tasks that fix this vulnerability option.
- Choose what you want to do:
- To start a task, select the check box next to the task name, and then click the Start button.
- To add a new rule to an existing task:
- Select the check box next to the task name, and then click the Add rule button.
- On the page that opens, configure the new rule:
- Rule for fixing vulnerabilities of this severity level
- Rule for fixing vulnerabilities by means of updates of the same type as the update defined as recommended for the selected vulnerability (available only for Microsoft software vulnerabilities)
- Rule for fixing vulnerabilities in applications from the selected vendor (available only for third-party software vulnerabilities)
- Rule for fixing a vulnerability in all versions of the selected application (available only for third-party software vulnerabilities)
- Rule for fixing the selected vulnerability
- Approve updates that fix this vulnerability
- Click the Add button.
- To create a task:
- Click the New task button.
- On the page that opens, configure the new rule:
- Rule for fixing vulnerabilities of this severity level
- Rule for fixing vulnerabilities by using updates of the type (available only for Microsoft software vulnerabilities)
- Rule for fixing vulnerabilities in applications from the selected vendor (available only for third-party software vulnerabilities)
- Rule for fixing a vulnerability in all versions of the selected application (available only for third-party software vulnerabilities)
- Rule for fixing the selected vulnerability
- Approve updates that fix this vulnerability
- Click the Add button.
If you have chosen to start a task, you can close the wizard. The task will complete in background mode. No further actions are required.
If you have chosen to add a rule to an existing task, the task properties window opens. The new rule is already added to the task properties. You can view or modify the rule or other task settings. Click the Save button to save the changes.
If you have chosen to create a task, you continue to create the task in the New task wizard. The new rule that you added in the Vulnerability fix wizard is displayed in the New task wizard. When you complete the New task wizard, the Install required updates and fix vulnerabilities task is added to the task list.
Creating the Fix vulnerabilities task
The Fix vulnerabilities task enables you fix vulnerabilities in Microsoft software on managed devices that are running Windows.
The availability of this feature depends on the Kaspersky Security Center Cloud Console mode and your current license. We recommend that you use the Install required updates and fix vulnerabilities task instead of the Fix vulnerabilities task. The Install required updates and fix vulnerabilities task enables you to install multiple updates and fix multiple vulnerabilities automatically, according to the rules that you define.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
A user interaction may be required when you update a third-party application or fix a vulnerability in a third-party application on a managed device. For example, the user may be prompted to close the third-party application if it is currently open.
To create the Fix vulnerabilities task:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Proceed through the wizard by using the Next button.
- For the Kaspersky Security Center Cloud Console application, select the Fix vulnerabilities task type.
- Specify the name for the task that you are creating.
A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- Select devices to which the task will be assigned.
- Click the Add button.
The list of vulnerabilities opens.
- Select the vulnerabilities that you want to fix, and then click OK.
- Specify the operating system restart settings:
- Specify the account settings:
- If on the Finish task creation page you enable the Open task details when creation is complete option, you can modify the default task settings. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
- Click the Finish button.
The task is created and displayed in the list of tasks.
- Click the name of the created task to open the task properties window.
- In the task properties window, specify the general task settings according to your needs.
- Click the Save button.
The task is created and configured.
Creating the Install required updates and fix vulnerabilities task
The availability of the Install required updates and fix vulnerabilities task depends on the Kaspersky Security Center Cloud Console mode and your current license.
The Install required updates and fix vulnerabilities task is used to update and fix vulnerabilities in third-party software, including Microsoft software, installed on the managed devices. This task enables you to install multiple updates and fix multiple vulnerabilities according to certain rules.
To install updates or fix vulnerabilities by using the Install required updates and fix vulnerabilities task, you can do one of the following:
- Run the Update installation wizard or the Vulnerability fix wizard.
- Create an Install required updates and fix vulnerabilities task.
- Add a rule for update installation to an existing Install required updates and fix vulnerabilities task.
The software update installation tasks have a number of limitations. These limitations depend on the license under which you are using Kaspersky Security Center Cloud Console and on the mode in which Kaspersky Security Center Cloud Console is working.
To create the Install required updates and fix vulnerabilities task:
- In the main menu, go to Assets (Devices) → Tasks.
- Click Add.
The New task wizard starts. Follow the steps of the wizard.
- For the Kaspersky Security Center Cloud Console application, select the Install required updates and fix vulnerabilities task type.
- Specify the name for the task that you are creating. A task name cannot be more than 100 characters long and cannot include any special characters ("*<>?\:|).
- Select devices to which the task will be assigned.
- Specify the rules for update installation, and then specify the following settings:
- Start installation at device restart or shutdown
- Install the required general system components
- Allow installation of new application versions during updates
- Download updates to the device without installing them
- Download updates to
- Enable advanced diagnostics
- Maximum size, in MB, of advanced diagnostics files
- Specify operating system restart settings:
- If on the Finish task creation page you enable the Open task details when creation is complete option, you can modify the default task settings. If you do not enable this option, the task is created with the default settings. You can modify the default settings later, at any time.
- Click the Finish button.
The task is created and displayed in the list of tasks.
- Click the name of the created task to open the task properties window.
- In the task properties window, specify the general task settings according to your needs.
- Click the Save button.
The task is created and configured.
If the task results contain a warning of the 0x80240033 "Windows Update Agent error 80240033 ("License terms could not be downloaded.")" error, you can resolve this issue through the Windows Registry.
Adding rules for update installation
The availability of this feature depends on the Kaspersky Security Center Cloud Console mode and your current license.
When installing software updates or fixing software vulnerabilities by using the Install required updates and fix vulnerabilities task, you must specify rules for the update installation. These rules determine the updates to install and the vulnerabilities to fix.
The exact settings depend on whether you add a rule for all updates, for Windows Update updates, or for updates of third-party applications (applications made by software vendors other than Kaspersky and Microsoft). When adding a rule for Windows Update updates or updates of third-party applications, you can select specific applications and application versions for which you want to install updates. When adding a rule for all updates, you can select specific updates that you want to install and vulnerabilities that you want to fix by means of installing updates.
You can add a rule for update installation in the following ways:
- By adding a rule while creating a new Install required updates and fix vulnerabilities task.
- By adding a rule on the Application Settings tab in the properties window of an existing Install required updates and fix vulnerabilities task.
- Through the Update installation wizard or the Vulnerability fix wizard.
To add a new rule for all updates:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for all updates.
- On the General criteria page, use the drop-down lists to specify the following settings:
- On the Updates page, select the updates to be installed:
- On the Vulnerabilities page, select vulnerabilities that will be fixed by installing the selected updates:
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
To add a new rule for Windows Update updates:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for Windows Update.
- On the General criteria page, specify the following settings:
- On the Applications page, select the applications and application versions for which you want to install updates. By default, all applications are selected.
- On the Categories of updates page, select the categories of updates to be installed. These categories are the same as in Microsoft Update Catalog. By default, all categories are selected.
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
To add a new rule for updates of third-party applications:
- Click the Add button.
The Rule creation wizard starts. Proceed through the wizard by using the Next button.
- On the Rule type page, select Rule for third-party updates.
- On the General criteria page, specify the following settings:
- On the Applications page, select the applications and application versions for which you want to install updates. By default, all applications are selected.
- On the Name page, specify the name for the rule that you are adding. You can later change this name in the Settings section of the properties window of the created task.
After the Rule creation wizard completes its operation, the new rule is added and displayed in the rule list in the New task wizard or in the task properties.
Viewing information about software vulnerabilities detected on all managed devices
After you have scanned software on managed devices for vulnerabilities, you can view the list of software vulnerabilities detected on all managed devices. If you run the task for the hierarchy of Administration Servers, you can view the list of managed devices with detected vulnerabilities only for the selected Administration Server.
To view the list of software vulnerabilities detected on all managed devices,
In the main menu, go to Operations → Patch management → Software vulnerabilities.
The page displays the list of software vulnerabilities detected on client devices.
You can also generate and view a Report on vulnerabilities.
You can specify a filter to view the list of software vulnerabilities. Click the Filter icon () in the upper right corner of the software vulnerabilities list to manage the filter. You can also select one of preset filters from the Preset filters drop-down list above the software vulnerabilities list.
You can obtain detailed information about any vulnerability from the list.
To obtain information about a software vulnerability:
In the list of software vulnerabilities, click the link with the name of the vulnerability.
The properties window of the software vulnerability opens.
Viewing information about software vulnerabilities detected on the selected managed device
You can view information about software vulnerabilities detected on the selected managed device running Windows.
To view the list of software vulnerabilities detected on the selected managed device:
- In the main menu, go to Assets (Devices) → Managed devices.
The list of managed devices is displayed.
- In the list of managed devices, click the link with the name of the device for which you want to view detected software vulnerabilities.
The properties window of the selected device is displayed.
- In the properties window of the selected device, select the Advanced tab.
- In the left pane, select the Software vulnerabilities section.
The list of software vulnerabilities detected on the selected managed device is displayed.
To view the properties of the selected software vulnerability,
Click the link with the name of the software vulnerability in the list of software vulnerabilities.
The properties window of the selected software vulnerability is displayed.
Viewing statistics of vulnerabilities on managed devices
You can view statistics for each software vulnerability on managed devices. Statistics are represented as a diagram. The diagram displays the number of devices with the following statuses:
- Ignored on: <number of devices>. This status is assigned if, in the vulnerability properties, you have manually set the option to ignore the vulnerability.
- Fixed on: <number of devices>. This status is assigned if the task to fix the vulnerability has successfully completed.
- Fix scheduled on: <number of devices>. This status is assigned if you have created the task to fix the vulnerability, but the task is not performed yet.
- Patch applied on: <number of devices>. This status is assigned if you have manually selected a software update to fix the vulnerability, but this software update has not fixed the vulnerability.
- Fix required on: <number of devices>. This status is assigned if the vulnerability was fixed only on some managed devices, and the vulnerability is required to be fixed on more managed devices.
To view the statistics of a vulnerability on managed devices:
- In the main menu, go to Operations → Patch management → Software vulnerabilities.
The page displays a list of vulnerabilities in applications detected on managed devices.
- Select the check box next to the required vulnerability.
- Click the Statistics of vulnerability on devices button.
A diagram of the vulnerability statuses is displayed. Clicking a status opens a list of devices on which the vulnerability has the selected status.
Exporting the list of software vulnerabilities to a file
You can export the displayed list of vulnerabilities to the CSV or TXT files. You can use these files, for example, to send them to your information security manager or to store them for purposes of statistics.
To export the list of software vulnerabilities detected on all managed devices to a text file:
- In the main menu, go to Operations → Patch management → Software vulnerabilities.
The page displays a list of vulnerabilities in applications detected on managed devices.
- Click the Export to TXT or Export to CSV button, depending on the format you prefer for export.
The file containing the list of software vulnerabilities is downloaded to the device that you use at the moment.
To export the list of software vulnerabilities detected on selected managed device to a text file:
- Open the list of software vulnerabilities detected on selected managed device.
- Select the software vulnerabilities you want to export.
Skip this step if you want to export a complete list of software vulnerabilities detected on the managed device.
If you want to export complete list of software vulnerabilities detected on the managed device, only vulnerabilities displaying on the current page will be exported.
- Click the Export to TXT or Export to CSV button, depending on the format you prefer for export.
The file containing the list of software vulnerabilities detected on the selected managed device is downloaded to the device you are using at the moment.
Ignoring software vulnerabilities
You can ignore software vulnerabilities to be fixed. The reasons to ignore software vulnerabilities might be, for example, the following:
- You do not consider the software vulnerability to be critical to your organization.
- You understand that the software vulnerability fix can damage data related to the software that required the vulnerability fix.
- You are sure that the software vulnerability is not dangerous for your organization's network because you use other measures to protect your managed devices.
You can ignore a software vulnerability on all managed devices or only on selected managed devices.
To ignore a software vulnerability on all managed devices:
- In the main menu, go to Operations → Patch management → Software vulnerabilities.
The page displays the list of software vulnerabilities detected on managed devices.
- In the list of software vulnerabilities, click the link with the name of the software vulnerability you want to ignore.
The software vulnerability properties window opens.
- On the General tab, enable the Ignore vulnerability option.
- Click the Save button.
The software vulnerability properties window closes.
The software vulnerability is ignored on all managed devices.
To ignore a software vulnerability on the selected managed device:
- In the main menu, go to Assets (Devices) → Managed devices.
The list of managed devices is displayed.
- In the list of managed devices, click the link with the name of the device on which you want to ignore a software vulnerability.
The device properties window is opened.
- In the device properties window, select the Advanced tab.
- In the left pane, select the Software vulnerabilities section.
The list of software vulnerabilities detected on the device is displayed.
- In the list of software vulnerabilities, select the vulnerability you want to ignore on the selected device.
The software vulnerability properties window opens.
- In the software vulnerability properties window, on the General tab, enable the Ignore vulnerability option.
- Click the Save button.
The software vulnerability properties window closes.
- Close the device properties window.
The software vulnerability is ignored on the selected device.
The ignored software vulnerability will not be fixed after the completion of the Fix vulnerabilities task or Install required updates and fix vulnerabilities task. You can exclude ignored software vulnerabilities from the list of vulnerabilities by using a filter.
Scenario: Finding and fixing software vulnerabilities
This section provides a scenario for finding and fixing vulnerabilities on the managed devices running Windows. You can find and fix software vulnerabilities in the operating system and in third-party software, including Microsoft software.
Prerequisites
- Kaspersky Security Center Cloud Console is deployed in your organization.
- There are managed devices running Windows in your organization.
Stages
Finding and fixing software vulnerabilities proceeds in stages:
- Scanning for vulnerabilities in the software installed on the client devices
To find vulnerabilities in the software installed on the managed devices, run the Find vulnerabilities and required updates task. When this task is complete, Kaspersky Security Center Cloud Console receives the lists of detected vulnerabilities and required updates for the third-party software installed on the devices that you specified in the task properties.
The Find vulnerabilities and required updates task is created automatically by Kaspersky Security Center Cloud Console quick start wizard. If you did not run the wizard, start it now or create the task manually.
How-to instructions: Creating the Find vulnerabilities and required updates task
- Analyzing the list of detected software vulnerabilities
View the Software vulnerabilities list and decide which vulnerabilities are to be fixed. To view detailed information about each vulnerability, click the vulnerability name in the list. For each vulnerability in the list, you can also view the statistics on the vulnerability on managed devices.
How-to instructions:
- Configuring vulnerabilities fix
When the software vulnerabilities are detected, you can fix the software vulnerabilities on the managed devices by using the Install required updates and fix vulnerabilities task or the Fix vulnerabilities task.
The Install required updates and fix vulnerabilities task is used to update and fix vulnerabilities in third-party software, including Microsoft software, installed on the managed devices. This task enables you to install multiple updates and fix multiple vulnerabilities according to certain rules. Availability of this task depends on the Kaspersky Security Center Cloud Console mode and your current license. To fix software vulnerabilities, the Install required updates and fix vulnerabilities task uses recommended software updates.
The Fix vulnerabilities task uses recommended fixes for Microsoft software.
You can start Vulnerability fix wizard that creates one of these tasks automatically, or you can create one of these tasks manually.
How-to instructions: Fixing vulnerabilities in third-party software, Creating the Install required updates and fix vulnerabilities
- Scheduling the tasks
To be sure that the vulnerabilities list is always up-to-date, schedule the Find vulnerabilities and required updates task to run it automatically from time to time. The recommended average frequency is once a week.
If you have created the Install required updates and fix vulnerabilities task, you can schedule it to run with the same frequency as the Find vulnerabilities and required updates task or less often. When scheduling the Fix vulnerabilities task, note that you have to select fixes for Microsoft software every time before starting the task.
When scheduling the tasks, make sure that a task to fix vulnerability starts after the Find vulnerabilities and required updates task is complete.
- Ignoring software vulnerabilities (optional)
If you want, you can ignore software vulnerabilities to be fixed on all managed devices or only on the selected managed devices.
How-to instructions: Ignoring software vulnerabilities
- Running a vulnerability fix task
Start the Install required updates and fix vulnerabilities task or the Fix vulnerabilities task. After the task is complete, make sure that it has the Completed successfully status in the task list.
- Create the report on results of fixing software vulnerabilities (optional)
To view detailed statistics on the vulnerabilities fix, generate the Report on vulnerabilities. The report displays information about software vulnerabilities that are not fixed. Thus you can have an idea about finding and fixing vulnerabilities in third-party software, including Microsoft software, in your organization.
How-to instructions: Generating and viewing a report
- Checking configuration of finding and fixing vulnerabilities in third-party software
Make sure of the following:
- The list of software vulnerabilities on managed devices is not empty.
- A task to fix vulnerabilities is in the task list.
- The tasks to find and to fix software vulnerabilities are scheduled so that they start sequentially. View the properties of these tasks and compare their schedule.
- The task to fix software vulnerabilities was successfully completed. View information on the Results tab of the task properties window.
Results
If you have created and configured the Install required updates and fix vulnerabilities task, the vulnerabilities are fixed on the managed devices automatically. When the task is run, it correlates the list of available software updates to the rules specified in the task settings. All software updates that meet the criteria in the rules will be downloaded to the repositories of distribution points and will be installed to fix software vulnerabilities, except for Windows Updates. To install Windows Updates, you have to ensure the access to Microsoft Updates public servers on your managed devices.
If you have created the Fix vulnerabilities task, only software vulnerabilities in Microsoft software are fixed.
Page topSetting the maximum storage period for the information about fixed vulnerabilities
To set the maximum storage period in the database for the information about the vulnerabilities that have already been fixed on managed devices:
- In the main menu, click the settings icon (
) next to the name of the required Administration Server.
The Administration Server properties window opens.
- On the page that opens, proceed to the Events repository tab.
- Specify the maximum storage period for the information about the fixed vulnerabilities in the database.
By default, the storage period is 7 days in the trial mode and 60 days in the commercial mode. The maximum limit is 14 days in the trial mode and 365 days in the commercial mode.
- Click Save.
The maximum storage period for the information about the fixed vulnerabilities is limited to the specified number of days.
Page topManaging applications run on client devices
This section describes the features of Kaspersky Security Center Cloud Console related to the management of applications run on client devices.
Using Application Control to manage executable files
You can use the Application Control component to allow or block startup of executable files on user devices. The Application Control component supports Windows-based and Linux-based operating systems.
For Linux-based operating systems, Application Control component is available starting from Kaspersky Endpoint Security 11.2 for Linux.
Prerequisites
- Kaspersky Security Center Cloud Console is deployed in your organization.
- The policy of Kaspersky Endpoint Security for Windows or Kaspersky Endpoint Security for Linux is created and is active.
Stages
Application Control usage scenario proceeds in stages:
- Forming and viewing the list of executable files on client devices
This stage helps you find out what executable files are found on managed devices. View the list of executable files and compare it with the lists of allowed and prohibited executable files. The restrictions on executable files usage can be related to the information security polices in your organization.
How-to instructions: Obtaining and viewing a list of executable files installed on client devices
- Creating categories for the executable files used in your organization
Analyze the lists of executable files stored on managed devices. Based on the analysis, create categories for executable files. It is recommended to create a "Work applications" category that covers the standard set of executable files that are used at your organization. If different security groups use their own sets of executable files in their work, a separate category can be created for each security group.
How-to instructions: Creating application category with content added manually, Creating application category that includes executable files from selected devices
- Configuring Application Control in the Kaspersky Endpoint Security for Windows policy
Configure the Application Control component in Kaspersky Endpoint Security for Windows policy using the categories you have created on the previous stage.
How-to instructions: Configuring Application Control in the Kaspersky Endpoint Security for Windows policy
- Turning on Application Control component in test mode
To ensure that Application Control rules do not block executable files required for user's work, it is recommended to enable testing of Application Control rules and analyze their operation after creating new rules. When testing is enabled, Kaspersky Endpoint Security for Windows will not block executable files whose startup is forbidden by Application Control rules, but will instead send notifications about their startup to the Administration Server.
When testing Application Control rules, it is recommended to perform the following actions:
- Determine the testing period. Testing period can vary from several days to two months.
- Examine the events resulting from testing the operation of Application Control.
How-to instructions: Configuring Application Control component in the Kaspersky Endpoint Security for Windows policy. Follow this instruction and enable the test mode in configuration process.
- Changing the categories settings of Application Control component
If necessary, make changes to the Application Control settings. Based on the test results, you can add executable files related to events of the Application Control component to an application category with content added manually.
How-to instructions: Adding event-related executable files to the application category
- Applying the rules of Application Control in operation mode
After Application Control rules are tested and configuration of categories is complete, you can apply the rules of Application Control in operation mode.
How-to instructions: Configuring Application Control component in the Kaspersky Endpoint Security for Windows policy. Follow this instruction and disable the test mode in configuration process.
- Verifying Application Control configuration
Make sure of the following:
- The list of categories for executable files is not empty. View the list of categories and make sure it contains the categories you have configured.
- Application Control is configured using created categories for executable files. View the settings of the Kaspersky Endpoint Security for Windows policy and make sure you have configured Application Control in the Application settings → Security Controls → Application Control.
- The rules of Application Control are applied in operation mode. Check the mode in the Kaspersky Endpoint Security for Windows policy and make sure you have disabled the Test mode in the Application settings → Security Controls → Application Control.
Results
When the scenario is complete, startup of executable files on managed devices is controlled. The users can run only those executable files that are allowed in your organization and cannot run executable files that are prohibited in your organization.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Application Control modes and categories
The Application Control component monitors users' attempts to start executable files. You can use Application Control rules to control the startup of executable files.
Application Control component is available for Kaspersky Endpoint Security for Windows and for Kaspersky Endpoint Security for Linux (version 11.2 and later). All the instructions in this section describe configuration of Application Control for Kaspersky Endpoint Security.
Startup of executable files whose settings do not match any of the Application Control rules is regulated by the selected operating mode of the component:
- Denylist. The mode is used if you want to allow the startup of all executable files except those specified in block rules. Denylist mode is selected by default.
- Allowlist. The mode is used if you want to block the startup of all executable files except those specified in allow rules.
The Application Control rules are implemented through categories for executable files. In Kaspersky Security Center Cloud Console there are two types of categories:
- Category with content added manually. You define conditions, for example, file metadata, file hashcode, file certificate, KL category, file path, to include executable files in the category.
- Category that includes executable files from selected devices. You specify a device whose executable files are automatically included in the category.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Obtaining and viewing a list of applications installed on client devices
Kaspersky Security Center Cloud Console inventories all software installed on managed client devices running Linux and Windows.
Network Agent compiles a list of applications installed on a device, and then transmits this list to Administration Server. It takes about 10-15 minutes for the Network Agent to update the application list.
For Windows-based client devices, Network Agent receives most of the information about installed applications from the Windows registry. For Linux-based client devices, package managers provide information about installed applications to Network Agent.
To view the list of applications installed on managed devices:
- In the main menu, go to Operations → Third-party applications → Applications registry.
The page displays a table with the applications that are installed on managed devices. Select the application to view its properties, for example, vendor name, version number, list of executable files, list of devices on which the application is installed, list of available software updates, and list of detected software vulnerabilities.
- You can group and filter the data of the table with installed applications as follows:
- Click the settings icon (
) in the upper-right corner of the table.
In the invoked Columns settings menu, select the columns to be displayed in the table. To view the operating system type of the client devices on which the application is installed, select the Operating system type column.
- Click the filter icon (
) in the upper-right corner of the table, and then specify and apply the filter criterion in the invoked menu.
The filtered table of installed applications is displayed.
- Click the settings icon (
To view the list of applications installed on a specific managed device,
In the main menu, go to Devices → Managed devices → <device name> → Advanced → Applications registry. In this menu, you can export the list of applications to a CSV file or TXT file.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Obtaining and viewing a list of executable files installed on client devices
You can obtain the list of executable files stored on client devices in one of the following ways:
- Enabling notifications about applications startup in Kaspersky Endpoint Security policy.
- Creating an inventory task.
Enabling notifications about applications startup in Kaspersky Endpoint Security policy
To enable notifications about applications startup:
- Open the Kaspersky Endpoint Security policy settings, and then go to General settings → Reports and Storage.
- In the Data transfer to Administration Server settings group, select the About started applications check box, and save the changes.
When a user attempts to start executable files, information about these files is added to the list of executable files on a client device. Kaspersky Endpoint Security sends this information to Network Agent, and then Network Agent sends it to Administration Server.
Creating an inventory task
The feature of inventorying executable files is available for the following applications:
- Kaspersky Endpoint Security for Windows
- Kaspersky Endpoint Security for Linux (version 11.2 and later)
You can reduce load on the database while obtaining information about the installed applications. To do this, we recommend that you run an inventory task on reference devices on which a standard set of software is installed. The preferable number of devices is 1-3.
We strongly do not recommend running the inventory task when using the following databases: MySQL, PostgreSQL, SQL Server Express Edition, MariaDB (all editions).
To create an inventory task for executable files on client devices:
- In the main menu, go to Assets (Devices) → Tasks.
The list of tasks is displayed.
- Click the Add button.
The New task wizard starts. Follow the steps of the wizard.
- On the New task settings page, in the Application drop-down list, select Kaspersky Endpoint Security for Windows or Kaspersky Endpoint Security for Linux, depending on the operating system type of the client devices.
- In the Task type drop-down list, select Inventory.
- On the Finish task creation page, click the Finish button.
After the New task wizard is complete, the Inventory task is created and configured. If you want, you can change the settings for the created task. The newly created task is displayed in the list of tasks.
For a detailed description of the inventory task, refer to the following Helps:
After the Inventory task is performed, the list of executable files installed on managed devices is formed and you can view the list.
During inventory, the following formats of executable files can be detected (depending on the option that you select in the inventory task properties): MZ, COM, PE, NE, SYS, CMD, BAT, PS1, JS, VBS, REG, MSI, CPL, DLL, JAR, and HTML.
Viewing the list of executable files stored on managed devices
To view the list of executable files stored on client devices,
In the main menu, go to Operations → Third-party applications → Executable files.
The page displays the list of executable files installed on client devices.
If necessary, you can send the executable file of the managed device to the device where your Kaspersky Security Center Cloud Console is open.
To send an executable file:
- In the main menu, go to Operations → Third-party applications → Executable files.
- Click the link of the executable file that you want to send.
- In the window that opens, go to the Devices section, and then select the check box of the managed device from which you want to send the executable file.
Before you send the executable file, make sure that the managed device has a direct connection to the Administration Server, by selecting the Do not disconnect from the Administration Server check box. The maximum total number of devices with the Do not disconnect from the Administration Server option selected is 300.
- Click the Send button.
The selected executable file is downloaded for further sending to the device where your Kaspersky Security Center Cloud Console is open.
Creating application category with content added manually
You can specify a set of criteria as a template of executable files for which you want to allow or block a start in your organization. On the basis of executable files corresponding to the criteria, you can create an application category and use it in the Application Control component configuration.
To create an application category with content added manually:
- In the main menu, go to Operations → Third-party applications → Application categories.
The page with a list of application categories is displayed.
- Click the Add button.
The New category wizard starts. Proceed through the wizard by using the Next button.
- On the Select category creation method step, select the Category with content added manually. Data of executable files is manually added to the category option.
- On the Conditions step, click the Add button to add a condition criterion to include files in the creating category.
- On the Condition criteria step, select a rule type for the creation of category from the list:
- From KL category
- Select certificate from repository
- Specify path to application (masks supported)
- Removable drive
- Hash, metadata, or certificate:
The selected criterion is added to the list of conditions.
You can add as many criteria for the creating application category as you need.
- On the Exclusions step, click the Add button to add an exclusive condition criterion to exclude files from the category that is being created.
- On the Condition criteria step, select a rule type from the list, in the same way that you selected a rule type for category creation.
When the wizard finishes, the application category is created. It is displayed in the list of application categories. You can use the created application category when you configure Application Control.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Creating application category that includes executable files from selected devices
You can use executable files from selected devices as a template of executable files that you want to allow or block. Based on executable files from selected devices, you can create a category and use it in the Application Control component configuration.
To create a category that includes executable files from selected devices:
- In the main menu, go to Operations → Third-party applications → Application categories.
The page with a list of categories for executable files is displayed.
- Click the Add button.
The New category wizard starts. Proceed through the wizard by using the Next button.
- On the Select category creation method step, specify the category name and select the Category that includes executable files from selected devices. These executable files are processed automatically and their metrics are added to the category option.
- Click Add.
- In the window that opens, select a device or devices whose executable files will be used to create the category.
- Specify the following settings:
When the wizard finishes, the category for executable files is created. It is displayed in the list of categories. You can use the created category when you configure Application Control.
Viewing the list of application categories
You can view the list of configured application categories and the settings of each application category.
To view the list of application categories,
In the main menu, go to Operations → Third-party applications → Application categories.
The page with a list of application categories is displayed.
To view properties of an application category,
Click the name of the application category.
The properties window of the application category is displayed. The properties are grouped on several tabs.
Configuring Application Control in the Kaspersky Endpoint Security for Windows policy
After you create Application Control categories, you can use them for configuring Application Control in Kaspersky Endpoint Security for Windows policies.
To configure Application Control in the Kaspersky Endpoint Security for Windows policy:
- In the main menu, go to Assets (Devices) → Policies & profiles.
A page with a list of policies is displayed.
- Click Kaspersky Endpoint Security for Windows policy.
The policy settings window opens.
- Go to Application settings → Security Controls → Application Control.
The Application Control window with Application Control settings is displayed.
- The Application Control option is enabled by default. Switch the toggle button Application Control DISABLED to disable the option.
- In the Application Control Settings block settings, enable the operation mode to apply the Application Control rules and allow Kaspersky Endpoint Security for Windows to block startup of applications.
If you want to test the Application Control rules, in the Application Control Settings section, enable test mode. In test mode, Kaspersky Endpoint Security for Windows does not block startup of applications, but logs information about triggered rules in the report. Click the View report link to view this information.
- Enable the Control DLL modules load option if you want Kaspersky Endpoint Security for Windows to monitor the loading of DLL modules when applications are started by users.
Information about the module and the application that loaded the module will be saved to a report.
Kaspersky Endpoint Security for Windows monitors only the DLL modules and drivers loaded after the Control DLL modules load option is selected. Restart the computer after selecting the Control DLL modules load option if you want Kaspersky Endpoint Security for Windows to monitor all DLL modules and drivers, including those loaded before Kaspersky Endpoint Security for Windows is started.
- (Optional) In the Message templates block, change the template of the message that is displayed when an application is blocked from starting and the template of the email message that is sent to you.
- In the Application Control Mode block settings, select the Denylist or Allowlist mode.
By default, the Denylist mode is selected.
- Click the Rules Lists Settings link.
The Denylists and allowlists window opens to let you add an application category. By default, the Denylist tab is selected if the Denylist mode is selected, and the Allowlist tab is selected if the Allowlist mode is selected.
- In the Denylists and allowlists window, click the Add button.
The Application Control rule window opens.
- Click the Please choose a category link.
The Application Category window opens.
- Add the application category (or categories) that you created earlier.
You can edit the settings of a created category by clicking the Edit button.
You can create a new category by clicking the Add button.
You can delete a category from the list by clicking the Delete button.
- After the list of application categories is complete, click the OK button.
The Application Category window closes.
- In the Application Control rule window, in the Subjects and their rights section, create a list of users and groups of users to apply the Application Control rule.
- Click the OK button to save the settings and to close the Application Control rule window.
- Click the OK button to save the settings and to close the Denylists and allowlists window.
- Click the OK button to save the settings and to close the Application Control window.
- Close the window with the Kaspersky Endpoint Security for Windows policy settings.
Application Control is configured. After the policy is propagated to the client devices, the startup of executable files is managed.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Adding event-related executable files to the application category
After you configure Application Control in the Kaspersky Endpoint Security for Windows policies, the following events will be displayed in the list of events:
- Application startup prohibited (Critical event). This event is displayed if you have configured Application Control to apply rules.
- Application startup prohibited in test mode (Info event). This event is displayed if you have configured Application Control to test rules.
- Message to administrator about application startup prohibition (Warning event). This event is displayed if you have configured Application Control to apply rules and a user has requested access to the application that is blocked at startup.
It is recommended to create event selections to view events related to Application Control operation.
You can add executable files related to Application Control events to an existing application category or to a new application category. You can add executable files only to an application category with content added manually.
To add executable files related to Application Control events to an application category:
- In the main menu, go to Monitoring & reporting → Event selections.
The list of event selections is displayed.
- Select the event selection to view events related to Application Control and start this event selection.
If you have not created event selection related to Application Control, you can select and start a predefined selection, for example, Recent events.
The list of events is displayed.
- Select the events whose associated executable files you want to add to the application category, and then click the Assign to category button.
The New category wizard starts. Proceed through the wizard by using the Next button.
- On the wizard page, specify the relevant settings:
- In the Action on executable file related to the event section, select one of the following options:
- In the Rule type section, select one of the following options:
- Rules for adding to inclusions
- Rules for adding to exclusions
- In the Parameter used as a condition section, select one of the following options:
- Click OK.
When the wizard finishes, executable files related to the Application Control events are added to the existing application category or to a new application category. You can view settings of the application category that you have modified or created.
For detailed information about Application Control, refer to the following Help topics:
- Kaspersky Endpoint Security for Windows Online Help
- Kaspersky Endpoint Security for Linux Online Help
Creating an installation package of a third-party application from the Kaspersky database
Kaspersky Security Center Web Console allows you to perform remote installation of third-party applications by using installation packages. Such third-party applications are included in a dedicated Kaspersky database.
Creating installation packages of third-party applications from the Kaspersky database is only available under the Vulnerability and patch management license.
To create an installation package of a third-party application from the Kaspersky database:
- In the main menu, go to Discovery & deployment → Deployment & assignment → Installation packages.
- Click the Add button.
- On the New package wizard page that opens, select the Select an application from the Kaspersky database to create an installation package option, and then click Next.
- In the list of applications that opens, select the relevant application, and then click Next.
- Select the relevant localization language in the drop-down list, and then click Next.
This step is only displayed if the application offers multiple language options.
- If you are prompted to accept a License Agreement for the installation, on the End User License Agreement page that opens, click the link to read the License Agreement on the vendor's website, and then select the I confirm that I have fully read, understand, and accept the terms and conditions of this End User License Agreement check box.
- On the Name of the new installation package page that opens, in the Package name field, enter the name for the installation package, and then click Next.
Wait until the newly created installation package is uploaded to Administration Server. When the New package wizard displays the message informing you the package creation process was successful, click Finish.
The newly created installation package appears on the list of installation packages. You can select this package when creating or reconfiguring the Install application remotely task.
Viewing and modifying the settings of an installation package of a third-party application from the Kaspersky database
If you have previously created any installation packages of third-party applications listed in the Kaspersky database, you can subsequently view and modify the settings of these packages.
Modifying the settings of an installation package of a third-party application from the Kaspersky database is only available under the Vulnerability and patch management license.
To view and modify the settings of an installation package of a third-party application from the Kaspersky database:
- In the main menu, go to Discovery & deployment → Deployment & assignment → Installation packages.
- In the list of installation packages that opens, click the name of the relevant package.
- On the properties page that opens, modify the settings, if necessary.
- Click the Save button.
The settings that you modified are saved.
Settings of an installation package of a third-party application from the Kaspersky database
The settings of an installation package of a third-party application are grouped on the following tabs:
Only a part of the settings listed below are displayed by default so you can add the corresponding columns by clicking the Filter button and selecting relevant column names from the list.
- General tab:
- Entry field that contains the name of the installation package that can be edited manually
- Application
- Version
- Size
- Created
- Path
- Installation procedure tab:
- Install the required general system components
- Table that displays the update properties and containing the following columns:
- Name
- Description
- Source
- Type
- Category
- Importance level according to MSRC
- Importance level
- Patch importance level
- Article
- Bulletin
- Not assigned for installation (new version)
- To be installed
- Installing
- Installed
- Failed
- Restart is required
- Registered
- Installed in interactive mode
- Revoked
- Update approval status
- Revision
- Update ID
- Application version
- Superseded
- Superseding
- You must accept the terms of the License Agreement
- Description URL
- Application family
- Application
- Localization language
- Not assigned for installation (new version)
- Requires prerequisites installation
- Download mode
- Is a patch
- Not installed
- Settings tab that displays the installation package settings—with their names, descriptions, and values—used as command-line parameters during installation. If the package provides no such settings, the corresponding message is displayed. You can modify the values of these settings.
- Revision history tab that displays the installation package revisions and containing the following columns:
- Revision—The revision number of the installation packages.
- Time—Date and time the installation package settings were modified.
- User—Name of the user who modified the installation package settings.
- Action—Action performed on the installation package within the revision.
- Description—Description of the revision related to the change made to the installation package settings.
By default, the revision description is blank. To add a description to a revision, select the relevant revision, and then click the Edit description button. In the opened window, enter some text for the revision description.
Application tags
Kaspersky Security Center Cloud Console enables you to tag the applications from applications registry. A tag is the label of an application that can be used for grouping or finding applications. A tag assigned to applications can serve as a condition in device selections.
For example, you can create the [Browsers]
tag and assign it to all browsers such as Microsoft Internet Explorer, Google Chrome, Mozilla Firefox.
Creating an application tag
To create an application tag:
- In the main menu, go to Operations → Third-party applications → Application tags.
- Click Add.
A new tag window opens.
- Enter the tag name.
- Click OK to save the changes.
The new tag appears in the list of application tags.
Renaming an application tag
To rename an application tag:
- In the main menu, go to Operations → Third-party applications → Application tags.
- Select the check box next to the tag that you want to rename, and then click Edit.
A tag properties window opens.
- Change the tag name.
- Click OK to save the changes.
The updated tag appears in the list of application tags.
Assigning tags to an application
To assign one or several tags to an application:
- In the main menu, go to Operations → Third-party applications → Applications registry.
- Click the name of the application to which you want to assign tags.
- Select the Tags tab.
The tab displays all application tags that exist on the Administration Server. For tags assigned to the selected application, the check box in the Tag assigned column is selected.
- For tags that you want to assign, select check boxes in the Tag assigned column.
- Click Save to save the changes.
The tags are assigned to the application.
Removing assigned tags from an application
To remove one or several tags from an application:
- In the main menu, go to Operations → Third-party applications → Applications registry.
- Click the name of the application from which you want to remove tags.
- Select the Tags tab.
The tab displays all application tags that exist on the Administration Server. For tags assigned to the selected application, the check box in the Tag assigned column is selected.
- For tags that you want to remove, clear check boxes in the Tag assigned column.
- Click Save to save the changes.
The tags are removed from the application.
The removed application tags are not deleted. If you want, you can delete them manually.
Deleting an application tag
To delete an application tag:
- In the main menu, go to Operations → Third-party applications → Application tags.
- In the list, select the application tag that you want to delete.
- Click the Delete button.
- In the window that opens, click OK.
The application tag is deleted. The deleted tag is automatically removed from all of the applications to which it was assigned.