Kaspersky Next Pro View
- Kaspersky Next help
- What's new
- About Kaspersky Next
- Quick Start Guide
- Getting started with Kaspersky Next
- Kaspersky Next Management Console
- Initial setup of Kaspersky Next
- Interface of Kaspersky Next Management Console
- Deployment of security applications
- Upgrading Kaspersky Next
- Managing user accounts
- Managing devices
- Viewing the list of devices
- About device statuses
- Viewing the properties of a device
- Connecting devices running Windows, macOS, and Linux
- Renaming devices
- Assigning the owner of a device running Windows, macOS, or Linux
- Scenario: Creating, renewing, and uploading an APNs certificate
- Connecting mobile devices
- Sending commands to users' devices
- Deleting devices from the list of devices
- Starting and stopping anti-malware database updates and malware scans
- Updating the security application on devices running Windows, macOS, and Linux
- Managing device protection
- Managing security profiles
- About security profiles
- Viewing the list of security profiles
- Creating a security profile
- Editing a security profile
- Switching between security profile modes
- Assigning a security profile to a user or group of users
- Copying a security profile
- Exporting and importing security profiles
- Resetting a security profile
- Deleting a security profile
- Configuring device protection
- Configuring password protection of Network Agent
- Configuring updates of anti-malware databases
- Configuring a malware scan
- Managing security profiles
- Endpoint Detection and Response
- About Endpoint Detection and Response
- About Indicators of Compromise
- Starting the use of Endpoint Detection and Response
- Scenario: Configuring and using Endpoint Detection and Response
- Configuring IoC scans for potential threats
- Configuring execution prevention
- Viewing information about Endpoint Detection and Response alerts
- Taking manual response measures
- Canceling network isolation of a Windows device
- Exporting information about Endpoint Detection and Response alerts
- Disabling Endpoint Detection and Response
- Root-Cause Analysis
- Adaptive Anomaly Control
- Data Discovery
- About Data Discovery
- Categories of information detected by Data Discovery
- Starting the use of Data Discovery
- Connecting a Microsoft 365 organization to your workspace
- Viewing information about Data Discovery detections
- Example of analyzing a Data Discovery detection
- Exporting information about Data Discovery detections
- Disabling Data Discovery
- Cloud Discovery
- About Cloud Discovery
- Starting the use of Cloud Discovery
- Enabling and disabling Cloud Discovery in security profiles
- Viewing information about the use of cloud services
- Risk level of a cloud service
- Blocking access to unwanted cloud services
- Enabling and disabling the monitoring of internet connections on Windows devices
- Vulnerability Assessment and Patch Management
- Encryption Management
- Performing typical tasks
- Reports on device protection
- List of reports on device protection
- Protection status report
- Threats report
- Status of anti-malware database updates report
- Network attacks report
- Vulnerabilities report
- Cloud Discovery reports
- Adaptive Anomaly Control reports
- Detections by Device Control component report
- Detections by Web Control component report
- Encryption status of devices report
- Kaspersky applications versions report
- Working with reports
- Configuring regular delivery of reports by email
- List of reports on device protection
- Viewing the event log and configuring event notifications
- Managing objects in Quarantine
- Kaspersky Security Network
- About Kaspersky Security Network
- Exchanging information with Kaspersky Security Network
- Enabling the use of Kaspersky Security Network in Kaspersky Next
- Accepting terms and conditions of a KSN Statement
- Declining terms and conditions of a KSN Statement
- Disabling the use of Kaspersky Security Network in Kaspersky Next
- Kaspersky Business Hub
- About Kaspersky Business Hub
- Managing the list of companies on Kaspersky Business Hub
- Viewing the list of companies on Kaspersky Business Hub
- Viewing aggregated protection statistics
- Adding a new company to Kaspersky Business Hub
- Adding another workspace for a company registered on Kaspersky Business Hub
- Editing company information
- Deleting the workspace of a company
- Canceling deletion of a company workspace
- Viewing news and sending feedback
- Managing the list of licenses on Kaspersky Business Hub
- Taking cybersecurity training
- Selecting the data centers used to store Kaspersky Next information
- Resetting your password
- Editing the settings of an account in Kaspersky Business Hub
- Quick Start Guide for Managed Service Providers (MSPs)
- Kaspersky Next licensing
- Contact Technical Support
- Sources of information about the application
- Glossary
- Account on Kaspersky Business Hub
- Administration Server
- Anti-malware databases
- Apple Push Notification service (APNs) certificate
- Background scan
- Certificate Signing Request
- Compliance control
- Device owner
- File Threat Protection
- Host Intrusion Prevention (Application Privilege Control)
- iOS MDM device
- iOS MDM Server
- Kaspersky Business Hub
- Kaspersky Next Management Console
- Kaspersky Security Network (KSN)
- Mail Threat Protection
- Malicious web addresses
- Malware
- Managed device
- Network Agent
- Network Threat Protection
- Patch
- Phishing
- Protected device
- Proxy server
- Quarantine
- Security application
- Security profile
- Supervised device
- Trusted device
- Trusted Platform Module (TPM)
- Trusted zone
- Update importance level
- User alias
- Vulnerability
- Vulnerability severity level
- Web Threat Protection
- Windows device name
- Workspace
- Information about third-party code
- Trademark notices
Viewing the list of devices
The Devices section of Kaspersky Next Management Console displays a list of devices that are connected to the application. Those are the devices on which a security application is installed.
The list contains columns with the following information about devices and their owners:
- Status. An icon reflects the protection status of the device that has been connected to Kaspersky Next, in descending order of severity:
(Critical). A critical event occurred on the device.
(Warning). An important event that must be attended to occurred on the device.
(OK). Neither critical nor important events occurred on the device.
(No data yet). No data can be retrieved concerning the events that have occurred on the device.
- OS. Contains the name of the operating system installed on the device.
- Name. Contains the device name, and specifies the name and version of the operating system installed on the device. You can click the link with the name of a device to proceed to the page containing detailed information about the device.
- Device owner. Contains the user account name of the device owner and the email address of the device owner.
If the device does not have an assigned owner, Unassigned is displayed instead. If the device is running Windows, Kaspersky Next displays the View last signed-in link that leads to the device properties window. There, you can view the user alias of the last person who signed in on this device.
- Group name. Contains the name of the group to which the device owner belongs.
- Security profile. Contains the name of the security profileassigned to the device.
Named collection of settings of Kaspersky applications. This collection of settings ensures security on computers and mobile devices added to Kaspersky Next. A single profile contains the settings of all of the supported security applications. After a security profile is applied to a device that has been added to Kaspersky Next, the settings of the Kaspersky application on the device are replaced with those specified in the profile.
You can filter the list of devices by device status.
To filter the list of devices,
Next to Show devices, click the link with the required device status.
To remove the filter,
Click the All link.
You can sort the list of devices by column: Status, OS, Name, Device owner, or Group name.
To sort the list,
Click the link containing the column name.
The column name is displayed in uppercase characters. Next to the name of the column, an up arrow (˄) indicates the sorting direction. To change the sorting direction, click one more time. Next to the name of the column, a down arrow (˅) appears.
The Search entry field is located above the list. You can use this field to quickly find and switch to an object in a long list.