Kaspersky security center 10 firewall. Adding and changing access rules to web resources. You'll like it too

It often happens that Kaspersky antivirus, which is supposed to provide security local network, on the contrary, in every possible way interferes with access to network resources.

Therefore, here we will look at what to do if Kaspersky blocks the local network, and what settings are necessary if access to the computer is limited.

Before you begin diagnosing the problem, make sure that

  • - you have the latest version of the antivirus installed;
  • - The driver for the network card has been updated on the computer.

What to do if Kaspersky blocks the local network?

To check, you should temporarily disable the protection. To do this, right-click on the antivirus icon in the system tray and select “pause protection.”

It is also necessary to disable the Windows firewall - Kaspersky itself will perform the firewall task, assign statuses and monitor the network connection. If you leave the firewall enabled, the antivirus will periodically shut down the network.

You must immediately remember the name of the network and .

To do this, go to “Start” - “Control Panel” - “Network and Internet” - “Network and Sharing Center” shared access" - "Changing adapter parameters" - "Local network connection" (default local network name - network card model: Realtek RTL8102E..., Atheros and others).

Setting up Kaspersky for local network:

1) open the main antivirus window;
2) at the bottom left click the settings sign (gear);
3) in the left column, click “protection”;
4) then in the right window - “firewall”;

5) at the bottom - the “network” button;
6) select your network (the name of which you remembered earlier)

Double-click the network properties and select the “trusted network” network type.
Then, if necessary, you can disable the NDIS filter driver (network speed will increase significantly). It is disabled in the local network settings and cannot be configured.

You must turn on and restart your computer with the local network turned on and connected to network card computer cable, because Kaspersky begins to conflict with the Computer Browser service.

You can also prohibit or restrict certain programs from accessing the local network. To do this, follow steps one through four and select “Configure application rules.”

There are four groups to choose from: trusted, weakly constrained, strongly constrained, and untrusted. Using the right mouse button, select the appropriate priority for the programs to run, then add new groups and programs. To do this, select:

1) details and rules
2) network rules
3) restrictions
4) reset parameters
5)remove from the list
6) open the program folder

Default program rules are "inherited" from installed program, but they can be changed to the necessary ones. To do this, right-click the desired program(or subgroup) and select the appropriate item in the menu.

27.02.2015 12:45:58

Antivirus protection is one of the key components of protecting your computer from malware. Antivirus protection must be installed on your computer and updated regularly.

1. Recommendations for setting up Kaspersky Endpoint Security 10 for Windows

1.1. Workplace control

1.1.1. Program launch control

This component allows you to track attempts to launch programs by users and regulate the launch of programs using rules. To enable application launch control, you must perform the following steps:

2. In the block Workplace control Choose a section Program launch control;

Enable Application Launch Control;

Save.

1.1.2. Program activity control

This component records the activity performed by programs in the system and regulates the activities of the program depending on their status. To enable application activity control, you must perform the following steps:

1. Open the program settings window;

2. In the block Workplace control Choose a section Monitoring program activity;

3. Check the box next to the item Enable Application Privilege Control;

4. Save your changes by clicking the button Save.

1.1.3. Vulnerability monitoring

This component checks for program vulnerabilities upon startup and then running programs. To enable vulnerability monitoring you must:

1. Open the program settings window;

2. In the block Workplace control Choose a section Vulnerability monitoring;

3. Check the box next to the item Enable Vulnerability Monitoring;

4. Save your changes by clicking the button Save.

1.1.4. Device Control

This component allows you to control the connection of removable devices. To enable device control and select devices, you must perform the following steps:

1. Open the program settings window;

2. In the block Workplace control Choose a section Device control;

3. Check the box next to the item Enable Device Control;

4. In the list of devices, select the devices that need to be monitored;

Save.

1.1.5. Web control

This component allows you to control access to web resources depending on their content and location. To enable access control to web resources, you must perform the following steps:

1. Open the program settings window;

2. In the block Workplace control Choose a section Web control;

3. Check the box next to the item Enable Web Control;

4. Save your changes by clicking the button Save.

1.2. Antivirus protection

1.2.1. File antivirus

File Anti-Virus allows you to select one of the preset file security levels or configure them yourself, set the actions that the file anti-virus should perform when it detects an infected file, and select file scanning technologies and modes.

To enable File Anti-Virus, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section File antivirus;

3. Check the box Enable File Anti-Virus.

4. Save your changes by clicking the button Save.

Security level

  • high;
  • recommended;
  • short.

1. Open the program settings window;

2. In the block Antivirus protection Choose a section File antivirus;

3. In the block Security level

  • Security level
  • Settings

In the window that opens File antivirus

4. Save your changes by clicking the button Save.

To change the actions of File Anti-Virus when an infected file is detected, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section File antivirus;

3. In the block, select one of the following parameters:

  • Treat

4. Save your changes by clicking the button Save.

1.2.2. Mail antivirus

Mail antivirus scans incoming and outgoing mail messages for the presence of any files that pose a threat to the computer.

To enable Mail Anti-Virus you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section File antivirus;

3. Check the box Enable Mail Anti-Virus;

4. Save your changes by clicking the button Save.

Security level

Security levels are different sets of parameters used to protect file system. Kaspersky Endpoint Security 10 for Windows antivirus tool comes pre-installed with three security levels:

  • high;
  • recommended;
  • short.

To change the security level, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Mail antivirus;

3. In the block Security level select one of the following options:

  • Security level

Using the slider, select one of 3 preset security levels.

  • Settings

In the window that opens Mail antivirus configure the file security level yourself and save your changes.

4. Save your changes by clicking the button Save.

Actions when threats are detected

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Mail antivirus;

3. In the block Actions to take when a threat is detected select one of the following options:

  • Select action automatically
  • Perform action: Heal. Remove if treatment is not possible.
  • Treat
  • Delete if treatment is not possible

4. Save your changes by clicking the button Save.

1.2.3. Web Antivirus

Web Anti-Virus allows you to protect your computer when working on the Internet.

To enable Web Anti-Virus you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Web Antivirus;

3. Check the box Enable Web Anti-Virus.

4. Save your changes by clicking the button Save.

Security level

Security levels are different sets of settings used to protect the file system. Kaspersky Endpoint Security 10 for Windows antivirus tool comes pre-installed with three security levels:

  • high;
  • recommended;
  • short.

To change the security level of web traffic, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Web Antivirus;

3. In the block Security level select one of the following options:

  • Security level

Using the slider, select one of 3 preset security levels.

  • Settings

In the window that opens Mail antivirus configure the file security level yourself and save your changes.

4. Save your changes by clicking the button Save.

Actions when threats are detected

To change the actions of Mail Anti-Virus when an infected message is detected, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Web Antivirus;

3. In the block Actions to take when a threat is detected select one of the following options:

  • Select action automatically
  • Prohibit downloading.
  • Allow downloads

4. Save your changes by clicking the button Save.

1.2.4. IM Antivirus

IM Anti-Virus allows you to scan traffic transmitted by programs for instant messaging. To enable IM Anti-Virus you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section IM Antivirus;

3. Check the box Enable IM -Antivirus.

4. Save your changes by clicking the button Save.

Protection area

The protection area refers to objects scanned by IM Anti-Virus during operation. By default, IM Anti-Virus scans incoming and outgoing messages. In order to create a protection area, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section IM Antivirus;

3. In the block Protection area select one of the following:

  • Incoming and outgoing messages

When you select this option, IM Anti-Virus will scan all incoming and outgoing messages from instant messaging programs;

  • Incoming messages only

When you select this option, IM Anti-Virus will scan only incoming messages from instant messaging programs;

4. Save your changes by clicking the button Save.

Verification methods

Setting up the use of heuristic analysis

In order to configure IM Anti-Virus scanning methods, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section IM Antivirus;

3. In the block Verification methods

- Superficial;
- Average;
- Deep.

4. Save your changes by clicking the button Save.

Configuring IM Anti-Virus to check links against databases of malicious and phishing web addresses

In order to configure IM Anti-Virus checks for links against databases of malicious and phishing web addresses, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section IM Antivirus;

3. In the block Verification methods follow these steps:

  • Check links against a database of malicious web addresses

Selecting this option allows you to check links in messages from instant messaging programs to see if they belong to a database of malicious web addresses;

  • Check links against a database of phishing web addresses

Selecting this option allows you to check links in messages from instant messaging programs to see if they belong to the database of phishing web addresses.

4. Save your changes by clicking the button Save.

1.2.5. Firewall

A firewall allows you to protect data stored on a computer connected to a local network and the Internet. Firewall allows you to detect everything network connections on the computer and block all possible threats to the OS.

By default, the firewall is enabled. It is highly not recommended to turn it off. To enable or disable the firewall, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Firewall.

3. Do one of the following:

  • Check the box Enable firewall. When you check the box next to this item, Firewall will be enabled.
  • Uncheck Enable firewall. If you uncheck the box next to this item, Firewall will be disabled.

4. Save your changes by clicking the button Save.

1.2.6. Protection against network attacks

Protection against network attacks, having detected an attempt to attack a computer, blocks any network activity of the attacking computer in relation to the computer on which the anti-virus protection tool is installed. To enable protection against network attacks, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section Protection against network attacks;

3. Check the box next to the item Enable protection against network attacks;

4. Check the box next to the item Add the attacking computer to the block list on.

Save.

1.2.7. System monitoring

System monitoring collects data about the actions of programs running on the computer. In the future, the collected information can be used in the treatment of programs (rolling back actions performed by malicious programs in the OS), placing the executable file in quarantine if the program’s activity coincides with a pattern of dangerous behavior.

By default, Monitoring is enabled and running. Turning it off is only possible when absolutely necessary and is not recommended.

To turn Monitoring on and off, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section System monitoring;

3. Select one of the following:

  • Enable system monitoring.

You must check the box to enable monitoring

  • Turn off System Monitoring.

You must clear the checkbox to turn off monitoring.

4. Save your changes by clicking the button Save.

Setting up system monitoring

1. Open the program settings window;

2. In the block Antivirus protection Choose a section System monitoring;

3. Check the boxes for the required actions:

4. Save your changes by clicking the button Save.

Using patterns of dangerous program behavior

To use templates you must complete the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section System monitoring;

3. In the block Proactive Defense check the box Use updated behavior patterns (BSS).

4. Dropdown When malicious program activity is detected select necessary action:

  • Select action automatically.

When you select this item, the default actions are performed. Default executable file The malware is quarantined.

  • Move file to quarantine.

When you select this item, the detected malicious file will be moved to quarantine.

  • Terminate the malware.

When you select this item, if a malicious program is detected, the antivirus will shut down its operation.

  • Miss.

When you select this item, if a malicious file is detected, the antivirus does not take any action with it.

Rolling back malware actions during disinfection

To enable or disable the rollback of malware actions during disinfection, you must perform the following steps:

1. Open the program settings window;

2. In the block Antivirus protection Choose a section System monitoring;

3. Select one of the following actions:

When you check the box next to this item, when treating malware, the actions performed by these programs in the OS will be rolled back.

If you uncheck the box next to this item, when treating malware, the actions performed by these programs in the OS will not be rolled back.

  • Roll back malware actions during disinfection.

4. Save your changes by clicking the button Save.

1.3. Scheduled tasks

Setting up scheduled tasks allows you to perform any actions at a specified time, which ensures that checks and updates are performed regularly.

1.3.1. Update

To set the update execution time, you must perform the following steps:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Update;

3. In the block Startup mode and update source click the button Startup mode...

4. In the window that opens, go to the tab Startup mode. Select one of the following update installation options:

When selecting this item, you must configure Periodicity installing updates.

5. Save your changes by clicking the button Save.

1.3.2. Full check

Security level

To configure the security level for a full scan, you must perform the following steps:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Full check;

3. In the block Security level

4. Save your changes by clicking the button Save.

Actions when threats are detected

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Full check;

3. In the block

  • Select action automatically
  • Perform an action
  • Treat
  • Remove if treatment is not possible.

4. Save your changes by clicking the button Save.

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Full check;

3. In the block Launch mode and scan objects

  • Startup mode
- Manually
- Scheduled.
  • Objects to check

4. Save your changes by clicking the button Save.

1.3.3. Checking Important Areas

To configure the security level for scanning critical areas, you must perform the following steps:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Checking Important Areas;

3. In the block Security level use the slider to select the security level. There are 3 levels:

  • Short
  • Recommended
  • High

4. Save your changes by clicking the button Save.

Actions when threats are detected

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Checking Important Areas;

3. In the block Action when a threat is detected you must select one of the following actions:

  • Select action automatically
  • Perform an action

When you select an item, you can choose the following actions:

- Treat

4. Save your changes by clicking the button Save.

Launch mode and scan objects

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Checking Important Areas;

3. In the block Launch mode and scan objects The following parameters need to be configured:

  • Startup mode

When you click this button, the settings window will open. You must select one of the launch modes:

- Manually
- Scheduled.
  • Objects to check

When you click this button, the settings window will open. It is necessary to mark objects for verification, and you can also add new objects.

4. Save your changes by clicking the button Save.

1.3.4. Custom scan

To configure the custom scan security level, you must perform the following steps:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Custom scan;

3. In the block Security level use the slider to select the security level. There are 3 levels:

4. Save your changes by clicking the button Save.

Actions when threats are detected

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Custom scan;

3. In the block Action when a threat is detected you must select one of the following actions:

  • Select action automatically
  • Perform an action

When you select this item, you can choose the following actions:

- Treat
- Remove if treatment is impossible.

4. Save your changes by clicking the button Save.

Scan launch mode

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Checking Important Areas;

  • In the block Launch mode and scan objects needs to be configured Startup mode

When you click this button, the settings window will open. You must select one of the launch modes:

- Manually
- Scheduled.

Save.

1.3.5. Search for vulnerabilities

Searching for vulnerabilities allows you to carry out regular checks of installed software on vulnerabilities, thereby allowing you to quickly find out about possible problems and eliminate them in a timely manner.

Objects to check

To configure objects to scan for vulnerabilities, you must perform the following sequence of actions:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Search for vulnerabilities;

3. In the block Objects to check It is necessary to tick the boxes of the manufacturers in whose products it is necessary to search for vulnerabilities:

  • Microsoft
  • Other manufacturers

4. Save your changes by clicking the button Save.

To configure the vulnerability scan launch mode, you must perform the following steps:

1. Open the program settings window;

2. In the block Scheduled tasks Choose a section Search for vulnerabilities;

3. In the block Vulnerability scan launch mode You must select one of the following modes for launching a vulnerability scan:

  • Manually;
  • Scheduled.
  • Save your changes by clicking the button Save.

4. Save your changes by clicking the button Save.

2. Recommendations for setting up Dr.Web Desktop Security Suite (for Windows workstations), version 6.0

2.1. Notifications

Notifications allow the user to quickly receive information about important events in the operation of Dr.Web. To configure notifications, you must complete the following steps:

1. Open the program settings window;

2. In the tab Basic select item Notifications.

3. Check the box next to the item Use notifications and press the button Notification settings...

4. In the window that appears, select the checkboxes for the notifications you require. When selected, a checkbox can be selected in one of the columns:

  • Screen.

When you check the box next to this item, on-screen notifications will be displayed

  • Mail.

When you check the box next to this item, notifications will be sent by mail.

5. Set Extra options display on-screen notifications:

  • Don't show notifications in full screen mode.

Selecting this item allows you not to receive notifications when working with applications in full screen mode.

  • Display Firewall notifications on a separate screen in full screen mode.

Selecting this option allows you to display firewall notifications on a separate desktop while applications are running in full screen mode.

6. Save your changes by clicking the button OK.

2.2. Updates

To configure updates, you must perform the following steps:

1. Open the program settings window;

2. In the tab Basic select item Update.

3. Select components to be updated:

  • All (recommended);
  • Bases only.

4. Install Update frequency.

5. Configure the update source by clicking the button Change…

In the window that appears, select one of the update sources:

  • Internet (recommended).

When you select this item, updates are installed from the developer’s website.

  • Local or network folder.

When you select this item, updates are installed from the local or network folder to which the updates were copied.

  • Antivirus network.

When you select this item, updates are installed via a local network from a computer on which the antivirus is installed and an update mirror has been created,

6. Save your changes by clicking the button OK.

7. Select a proxy server by clicking the button Change…

In the window that appears, you need to specify the settings for connecting to the proxy server:

  • Address
  • User
  • Password
  • Authorization type

8. Save your changes by clicking the button OK.

9. Select an update mirror by clicking the button Change…

In the window that appears, specify the path to the folder into which updates will be copied.

10. Save your changes by clicking the button OK.

11. Save all changes made by clicking the button OK.

2.3. Antivirus network

Function Antivirus network allows remote control installed anti-virus protection tool from other computers within the same local network on which the same anti-virus protection tools are installed.

To enable this option, you must perform the following steps:

1. Open the program settings window;

2. In the tab Basic select item Antivirus network.

3. Check the box next to the item Allow remote control.

4. Save your changes by clicking the button OK.

2.4. Preventive protection

Setting up preventive protection allows you to set how the antivirus protection tool reacts to actions third party applications which can lead to infection of your computer.

Level of preventive protection

To configure the level of preventive protection, you must perform the following steps:

1. Open the program settings window;

2. In the tab Basic select item Preventive protection.

3. Set the blocking level for suspicious activities by clicking the button Change….

  • Minimum (recommended)

Default level. This level prohibits automatic modification of system objects, the modification of which clearly indicates an attempt to maliciously influence the OS. Low-level disk access and modification of the HOSTS file are also prohibited.

  • Average

This level additionally denies access to those critical objects that could potentially be used by malicious programs.

  • Paranoid

If you select this level, you will have access to interactive control over driver loading, automatic start programs and the operation of system services.

4. Save your changes by clicking the button OK.

Data Loss Protection

Data Loss Prevention allows you to create copies of the contents of selected folders, thereby protecting important files from being modified by malware.

To configure data loss prevention, you must complete the following steps:

1. Open the program settings window;

2. In the tab Basic select item Preventive protection.

3. To configure data loss protection, click the button Change…

4. In the window that opens, select the option Turn off data loss protection

5. To add files that need to be copied, click the button Add

6. Specify the location where copies will be stored and the frequency with which these copies will be created.

7. Save your changes by clicking the button OK.

To recover data in case of data loss, follow these steps:

1. Open the program settings window;

2. In the tab Basic select item Preventive protection.

3. Press the button Restore…

4. In the window that opens, select the date for which all specified copies of files will be restored to the specified folder.

5. To start recovery, click the button OK.

2.5. Self-defense

The self-defense function allows you to protect the antivirus protection tool from unauthorized influence.

To enable self-defense you must:

1. Open the program settings window;

2. In the tab Basic select item Self-defense.

3. Check the box next to the item Enable self-defense.

4. If necessary, check the boxes next to the following items:

  • Prohibit emulation of user actions

This option prohibits any changes in the operation of the anti-virus protection tool, except those made manually by the user.

  • Prohibit changing the system date and time

This option prohibits manual and automatic changes to system time settings.

  • Protect Dr.Web settings with a password

This option allows you to set a password to access the antivirus protection settings.

5. Save your changes by clicking the button OK.

2.6. Email protection

2.7. Excluded Applications

By default, mail traffic from all user applications on the computer is intercepted. In order to set an exception - applications whose mail traffic will not be intercepted, you must perform the following steps:

1. Open the program settings window;

2. In the tab SpIDer Mail select item Excluded Applications.

3. To add an application to the exception, enter the required name in the input field and click the button Add

4. Save your changes by clicking the button OK.

2.8. Firewall

A firewall helps protect your computer from unauthorized access and prevents important data from leaking over the network. It is highly not recommended to turn it off.

To enable or disable the firewall, you must perform the following steps:

1. Open the program settings window;

2. In the tab Firewall select item Turn on or Launch.

3. Save your changes by clicking the button OK.

To configure the firewall, follow these steps:

1. Open the program settings window;

2. In the tab Firewall go to the tab Applications

3. For each application you can:

  • Generate a set of filtering rules. To do this you need:

Press the button Create

Change

Copy.

  • Delete all rules for the program. To do this you need:

Delete.

4. Save your changes by clicking the button OK.

2.9. Interfaces

To define a set of filtering rules for packets transmitted through a specific network interface, you must perform the following steps:

1. Open the program settings window;

2. In the tab Firewall go to the tab Interfaces

3. Select the required interface from the list and match the required rule from the drop-down list.

4. Save your changes by clicking the button OK.

2.10. Packet filter

To set the packet filter operating parameters, you must perform the following steps:

1. Open the program settings window;

2. In the tab Firewall go to the tab Interfaces and press the button Tune

3. In the firewall settings window, you can do the following:

Generate sets of filtering rules. To do this you need to do the following:

  • Create a set of rules for new program. To do this you need:

Press the button Create

  • Edit an existing ruleset. To do this you need:

Select an existing ruleset in the list and click the button Change

  • Add a copy of an existing ruleset. To do this you need:

Select an existing ruleset and click the button Copy.

  • Delete the selected ruleset. To do this you need:

Select the appropriate set of rules and click the button Delete.

4. Save your changes by clicking the button OK.

2.11. Dr.Web scanner

3. Conclusion

Anti-virus protection is undoubtedly one of the important components in ensuring computer security, however, do not forget that anti-virus protection is not a panacea for all threats.

Don’t forget about the basic PC security settings (“”). It is also necessary to remember about Internet security (“”).

To add or change a web resource access rule, follow these steps:

  1. Open the program settings window.
  2. On the left side of the window in the section Workplace control select the Web Control subsection.

    The parameters of the Web Control component will be displayed in the right part of the window.

  3. Perform one of the following actions:
    • If you want to add a rule, click on the Add button.
    • If you want to change a rule, select the rule in the table and click the Edit button.

    A window will open.

  4. Set or change the rule parameters. To do this, follow these steps:
    1. In the Name field, enter or change the name of the rule.
    2. In the dropdown list Filter content select the required element:
      • Any content.
      • By content category.
      • By data type.
      • By content category and data type.
    3. If an item other than Any content, blocks for selecting content categories and/or data types will open. Check the boxes next to the names of the desired content categories and/or data types.

      Checking the box next to the name of the content category and/or data type means that Kaspersky Endpoint Security, in accordance with the rule, controls access to web resources belonging to the selected content categories and/or data types.

    4. In the dropdown list Apply to addresses select the required element:
      • To all addresses.
      • To individual addresses.
    5. If an item is selected To individual addresses, a block will open in which you need to create a list of web resource addresses. You can add or change web resource addresses using the Add, Edit, Delete buttons.
    6. Check the box Specify users and/or groups.
    7. Click on the Select button.

      A window will open Microsoft Windows Selecting Users or Groups.

    8. Set or change the list of users and/or user groups for whom access to the web resources described in the rule is allowed or restricted.
    9. From the Action drop-down list, select the desired item:
      • Allow . If this value is selected, Kaspersky Endpoint Security allows access to web resources that meet the rule parameters.
      • Forbid . If this value is selected, Kaspersky Endpoint Security denies access to web resources that meet the rule parameters.
      • Warn. If this value is selected, then when you try to access web resources that satisfy the rule, Kaspersky Endpoint Security displays a warning that the web resource is not recommended for visiting. Using the links in the warning message, the user can access the requested web resource.
    10. Select from drop down list Work schedule rules the name of the required schedule or create a new schedule based on the selected rule schedule. To do this, follow these steps:
      1. Click the Settings button next to the drop-down list Work schedule rules.

        A window will open Work schedule rules.

      2. To add a time interval during which the rule does not work to the rule’s work schedule, in the table showing the rule’s work schedule, use the left mouse button to select the table cells corresponding to the time and day of the week you need.

        The color of the cells will change to gray.

      3. To change the time interval during which the rule works in the rule schedule to the time interval during which the rule does not work, use the left mouse button to select the gray table cells corresponding to the time and day of the week you need.

        The color of the cells will change to green.

      4. Click on the Save As button.

        A window will open Rule work schedule name.

      5. Enter a name for the rule's work schedule or leave the default name.
      6. Click on the OK button.
  5. In the window Rule for accessing web resources click on the OK button.
  6. Click the Save button to save your changes.

The goals pursued are safety and safety again.

Let's imagine a very common situation: you have many servers on your network that provide some services. It is very likely that some of them have an external interface that looks into the WAN, i.e. V global network. Usually this is a Proxy server, Web server, mail server, etc. It's no secret that this fact itself makes you think about how literate system administrator about the security of your network infrastructure. It makes no sense to tell you what could happen if a hacker penetrates your network. There are many options to protect yourself from malicious attacks. Among them is building a so-called demilitarized zone or publishing a server through your proxy, which you certainly (isn’t it?) configured very strictly and seriously. The first option (DMZ) has not yet been “raised” due to some reasons. Let it be a lack of time and equipment for the system administrator. The second one (publish through another server) is very controversial, we’ll leave it out for now. For now, first, let's set up a firewall, also known as a firewall, or firewall. The main function of any firewall is to secure access to our computer from the outside. I specifically wrote the word “computer” because home computers and workstations can also be secured using a screen. Naturally, there is no 100% protection with a software firewall, but it’s better than nothing. In addition, I have a feeling that after my manipulations today, the server will no longer be at risk. Let's get started.

Laboratory stand

There is a server based Windows Server 2008 R2 providing VPN service using the Microsoft RAS service. Windows Firewall is configured by default. I didn’t delve into it, although I should have. But because you have a corporate license for Kaspersky Enterprise Space Security, why not take advantage of it and install Kaspersky Endpoint Security 8, which includes a software firewall.

Configuring Kaspersky firewall

The Kaspersky Endpoint Security 8 firewall is identical to many screens from this manufacturer, including the home screen Kaspersky version Internet Security 2013, so if someone has a different version of the antivirus, then most likely this article will also help him. Now let's begin.

Settings – anti-virus protection – firewall. Click the “Network packet rules” button. We get a list of rules that this moment are working. Some of them prohibit something, others allow it. At the moment everything looks something like this:

If you noticed, the screenshot is not original. I took it from another product - KIS2013, but take my word for it - in KES8 everything was exactly the same. And this is a server where protection should be at the highest level! As we can see, there is a lot here and everything is approximately clear: DNS queries (TCP/UDP), sending messages, any activity from trusted networks is completely allowed, from local ones - partially, the port responsible for the remote desktop is disabled, various TCP ports are disabled/ UDP, but activity from outside is partial, at the end of 5 rules of the ICMP protocol. Yes, half the rules are incomprehensible, half are unnecessary. Let's create a sheet from scratch and create our own rules.

The first thing I did was create my favorite rule - Deny All(ban everything)

and placed it down. Then, by searching the Internet, I found out which ports the VPN technology uses. This Protocol 47, which also has the name GRE:

I placed the rule with GRE above the prohibiting rule. Another port that needs to be opened for VPN is 1723 . So I created a rule VPN_IN:

I placed the rule with port 1723 at the very top. I modified the rest of the rules a little, and left some. The result is the following list (Firewall List):

I will comment on each one.

Let me make a reservation right away that you should not completely rely on this article. Perhaps I missed something. I'm not a security guru, so I apologize in advance if I made any mistakes. Criticism, suggestions and praise are welcome, write comments below.

You will also like:

Monitoring server load with Munin




Top