Logo Passei Direto
Buscar

kl_005 10 1_en_Kaspersky Security fo Win Server

Ferramentas de estudo

Material
páginas com resultados encontrados.
páginas com resultados encontrados.
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar esse material. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Prévia do material em texto

Kaspersky Technical Training
Kaspersky 
Security for 
Windows Server 
Lab Guide
KL 005.10.1
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Kaspersky Lab 
www.kaspersky.com 
Table of contents 
 
Lab 1. How to prepare the Administration Server ........................................................................................................ 2 
Lab 2. How to install Kaspersky Security 10.1 for Windows Server ......................................................................... 10 
Lab 3. How to install Kaspersky Security 10.1 Console ............................................................................................. 17 
Lab 4. How to configure updates and on-demand scanning ....................................................................................... 22 
Lab 5. How to configure Real-Time Protection .......................................................................................................... 31 
Lab 6. How to test protection of Docker containers ................................................................................................... 37 
Lab 7. How to test protection of Windows Subsystem for Linux ............................................................................... 50 
Lab 8. How protection of server shared folders works ............................................................................................... 54 
Lab 9. How to configure the Anti-Cryptor component ............................................................................................... 60 
Lab 10. How to set Traffic Security to Driver Interceptor mode ................................................................................ 67 
Lab 11. How to configure Traffic Security to scan mail traffic .................................................................................. 79 
Lab 12. How to configure Exploit Prevention ............................................................................................................ 90 
Lab 13. How to enable Applications Launch Control in the test mode ...................................................................... 99 
Lab 14. How to enable Applications Launch Control in the Default Deny mode .................................................... 110 
Lab 15. How to create allow rules for installation packages and updates ................................................................. 117 
Lab 16. How to configure System Inspection components ....................................................................................... 126 
Lab 17. How to configure integration with a SIEM system ...................................................................................... 138 
Lab 18. How to set Traffic Security to the External Proxy mode ............................................................................. 148 
Lab 19. How to protect a NetApp Clustered Data ONTAP 9.3 storage .................................................................... 155 
Lab 20. How to configure Anti-Cryptor for NetApp ................................................................................................ 166 
 
 
 
L–2 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Lab 1. 
How to prepare the Administration Server 
Scenario. ABC Inc. decided to purchase Kaspersky Security 10.1 for Windows Server to protect its servers. Protection 
products by Kaspersky Lab are already installed on the corporate workstations, and Kaspersky Security Center is used for 
remote management. The administrator is planning to prepare Kaspersky Security Center for the deployment of Kaspersky 
Security 10.1 for Windows Server; he or she will need its distribution, the latest fixes, and a license for this purpose. 
Contents. In this lab, we will: 
1. Unpack the Kaspersky Security 10.1 for Windows Server distribution on the administrator’s workstation 
2. Add a license for Kaspersky Security 10.1 for Windows Server 
3. Create a group for Kaspersky Security 10.1 for Windows Server 
4. Create an installation package for Kaspersky Security 10.1 for Windows Server 
Task A: Unpack the Kaspersky Security 10.1 for Windows Server distribution 
on the administrator’s workstation 
You can use Kaspersky Security Center to manage Kaspersky Security 10.1 for Windows Server, but its installation files are 
not available in Kaspersky Security Center by default. Therefore, we need to get a distribution of Kaspersky Security 10.1 for 
Windows Server to begin with. The easiest way is to download it from the official Kaspersky Lab website. To save time, we 
copied the distribution to the desktop in advance. Also, we copied the latest patch for Kaspersky Security 10.1 for Windows 
Server and the latest versions of plug-in and Administration Console to the administrator’s workstation. 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
 
1. Run the ks4ws_10.1.0.622_en.exe file (it is 
located on the desktop) 
2. Click Next 
 
3. Do not change the destination folder 
4. Click Next 
 
 L–3 
Lab 1 
 
 
5. Wait for the installation shell to open 
6. Close the window 
 
7. Open the folder 
C:\ks4ws\10.1.0.622\english\server\ 
8. Delete the file klcfginst.exe 
 
9. Open the folder 
C:\critical_fix_core_11(kb14306) 
10. Copy the following files (CTRL+C): 
— critical_fix_core_11(kb14306)_x64.msp 
— klcfginst.exe 
 
11. Return to the folder 
C:\ks4ws\10.1.0.622\english\server\ 
12. Paste the files (CTRL+V): 
— critical_fix_core_11(kb14306)_x64.msp 
— klcfginst.exe 
 
L–4 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task B: Add a license for Kaspersky Security 10.1 for Windows Server 
Kaspersky Security 10.1 for Windows Server requires a license key. 
The task is performed on Alex-Desktop. 
13. Run Kaspersky Security Center Administration Console 
14. Select the Kaspersky Lab Licenses node 
15. Click the button Add activation code or key 
 
 
16. Click the button Activate application with key file 
 
17. Click Browse 
18. Specify the path to the key file (it is located on the desktop) 
19. Select the check box Automatically deploy key to managed 
devices 
20. Click Next 
 
 L–5 
Lab 1 
 
 
21. Click Finish 
22. Make sure that the license has been added successfully 
 
Task C: Create a group for Kaspersky Security 10.1 for Windows Server 
To avoid confusion in Kaspersky Security Center and simplify finding the computers where Kaspersky Security 10.1 for 
Windows Server is installed, we recommend you to create a dedicated group and move computers into it automatically while 
installing Kaspersky Security 10.1 for Windows Server. 
 
L–6 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
The task is performed on Alex-Desktop. 
23. Go to the Managed devices group and open the Devices tab 
24. Click the New group button 
 
 
25. Type KSWS for the group name 
26. Click OK 
27. Make sure that the group has been created successfully 
 
Task D: Create an installation package for Kaspersky Security 10.1 for 
Windows Server 
To be able to remotely install an application through Kaspersky Security Center, you need to prepare its installation package. 
By default, only the Network Agent, Kaspersky Endpoint Security, and sometimes a few Mobile Device Management 
packages are available in Kaspersky Security Center. 
 
 L–7 
Lab 1 
 
The task is performed on Alex-Desktop. 
28. Select the Advanced | Remote installation | Installation packages container 
29. Click the Create installation package button 
 
 
30. Click the top button: Create an installation 
package for Kaspersky Lab application 
 
31. Type Kaspersky Security 10.1 for Windows 
Server for the package name 
32. Click Next 
 
L–8 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server33. Click Browse 
34. Specify the file 
C:\ks4ws\10.1.0.622\english\server\ks4ws.kud 
35. Click Open 
36. Click Next 
 
37. Select the check box the terms and conditions of 
this EULA 
38. Select the check box Privacy Policy describing 
the handling of data 
39. Click Next 
 
40. Wait for the Kaspersky Security 10.1 
Administration Plug-in Setup Wizard to start 
41. Click Next 
 
 L–9 
Lab 1 
 
 
42. Click OK 
 
43. Click Finish 
44. Make sure that the new package has appeared on the list 
 
 
L–10 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
45. Open the properties of the created installation 
package and switch to the Settings section 
46. Look through the list of components 
47. Close the installation package properties 
 
48. Open the Administration Server properties 
49. Switch to the Advanced | Information about the 
installed application management plug-ins 
section and make sure that the plug-in for 
Kaspersky Security 10.1 for Windows Server is 
listed there. Make sure that the plugin version is 
10.1.0.636 rather than 10.1.0.622 
 
Conclusion 
In this lab, we have taken the first steps towards the deployment of Kaspersky Security 10.1 for Windows Server. We 
unpacked the distribution, added the latest patch and a new version of management plug-in, then added a license and created a 
dedicated group on the Administration Server. Also, we added an installation package of Kaspersky Security 10.1 for 
Windows Server to the Administration Server and installed the plug-in of Kaspersky Security 10.1 for Windows Server. 
 
Lab 2. 
How to install Kaspersky Security 10.1 for 
Windows Server 
Scenario. The administrator is preparing for the deployment of Kaspersky Security 10.1 for Windows Server through 
Kaspersky Security Center: He has already installed the management plug-in, created an installation package, and added a 
license. He is to create a remote installation task for Kaspersky Security 10.1 for Windows Server now. The Network Agent is 
not yet installed on all of the servers, and the task should install the Agent along with Kaspersky Security 10.1 for Windows 
Server. Also, the task should automatically move the target computers to the dedicated group. 
 
 L–11 
Lab 2 
 
Contents. In this lab, we will: 
1. Install Kaspersky Security 10.1 for Windows Server through Kaspersky Security Center 
2. Control the installation results 
Task A: Install Kaspersky Security 10.1 for Windows Server through 
Kaspersky Security Center 
We need to create a task that will remotely install Kaspersky Security 10.1 for Windows Server on several computers. The task 
should also install the Network Agent on the computers where it is not yet installed. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, RDS, and Proxy machines must be powered on. 
1. Run Kaspersky Security Center Administration Console 
2. Go to the Tasks node 
3. Click the button Create a task 
 
 
4. Select the Install application remotely task type under 
Kaspersky Security Center 10 Administration Server 
5. Click Next 
 
L–12 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
6. Select Kaspersky Security 10.1 for Windows Server on the list 
7. Click Next 
 
8. Select to install Kaspersky Security Center 10 Network Agent 
9. Click Next 
 
10. Click Next twice 
11. Click Browse to specify the destination group for the target 
computers 
 
 L–13 
Lab 2 
 
 
12. Select the Managed devices | KSWS group 
13. Click OK 
 
14. Click Next 
 
15. Click Select networked devices detected by Administration 
Server 
 
L–14 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
16. Select the target computers: Security-Center, DC, DOCKER, 
RDS, and WSL 
17. Click Next 
 
18. Select the option Account required (for installation without 
Network Agent) 
19. Specify the account under which the products will be installed: 
abc\Administrator, password—Ka5per5Ky 
20. Click Next twice 
 
21. Type Install application remotely – KSWS 10.1 for the task 
name 
22. Click Next 
 
 L–15 
Lab 2 
 
 
23. Select the check box Run task after Wizard finishes 
24. Click Finish to close the wizard 
25. Wait for the task to complete successfully 
 
 
L–16 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task B: Control the installation results 
You can control the installation results in a few ways. One of them is the Kaspersky Lab software version report, which 
displays the number of devices protected with Kaspersky Security 10.1 for Windows Server. 
The task is performed on Alex-Desktop. 
26. Go to the KSWS group 
27. Make sure that the Security-Center, DC, RDS, Docker, and WSL computers are there (if not, move them there) 
 
28. Open the Administration Server node and switch to the Reports tab 
29. Double-click Kaspersky Lab software version report 
 
 
 L–17 
Lab 3 
 
30. Make sure that Kaspersky Security 10.1 for Windows Servers is installed on five computers 
 
 
Conclusion 
In this lab, we have studied remote installation of Kaspersky Security 10.1 for Windows Server together with the Network 
Agent. For management convenience, all computers were moved to a dedicated group. The Kaspersky Lab software version 
report helps to control the installation results. 
 
Lab 3. 
How to install Kaspersky Security 10.1 Console 
Scenario. The administrator has installed Kaspersky Security 10.1 for Windows Server through Kaspersky Security Center on 
the servers, and has decided to install Kaspersky Security 10.1 Console as an additional monitoring tool. Also, the 
administrator plans to configure a utility in Kaspersky Security Center to be able to remotely connect through Kaspersky 
Security Console to any Kaspersky Security 10.1 for Windows Server using the computer’s shortcut menu in Kaspersky 
Security Center. 
Contents. In this lab, we will: 
1. Install Kaspersky Security 10.1 Console locally 
2. In Kaspersky Security Center, create a utility that will start Kaspersky Security Console and automatically connect it 
to the selected server 
 
L–18 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task A: Install Kaspersky Security 10.1 Console locally 
Kaspersky Security 10.1 for Windows Server does not have a built-in user interface. The Kaspersky Security 10.1 Console 
application performs the interface functions. It is the second most important KSWS management tool after Kaspersky Security 
Center. Even if Kaspersky Security Center is used, we recommend that you install Kaspersky Security Console at least on the 
administrator’s workstation, since it provides additional monitoring capabilities. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, RDS, and Proxy machines must be powered on. 
 
1. Open the folder 
C:\critical_fix_core_1(kb14306)\client_14496_en\ 
2. Run the setup.exe file 
 
3. On the welcome page, click Next 
 
4. Select the check box the terms and conditions 
of this EULA 
5. Select the check box Privacy Policy 
describing the handling of data 
6. Click Next 
 
7. Select the Allow remote access check box 
8. Click Next 
 
 L–19 
Lab 3 
 
 
9. Click Install 
 
10. Wait for the installation to complete 
11. Click OK 
Task B: In Kaspersky Security Center, create a utility that will start 
Kaspersky Security Console and automatically connect to the selected 
server 
In this task, you will create a utility in Kaspersky Security Center to be able to automatically connect through the Kaspersky 
Security Console to any Kaspersky Security 10.1 for Windows Server using the computer’s shortcut menu. 
The task is performed on Alex-Desktop. 
12. Go to the KSWS subgroup and switch to the Devices tab 
13. On the shortcut menu of the Security-Center computer, click Custom tools | Configure custom tools 
 
 
L–20 KASPERSKY LAB™ 
KL005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
14. Click Add 
15. Type KSWS in the Tool name field 
16. Specify the path in the Executable file name field: 
%WINDIR%\system32\mmc.exe 
17. In the Working directory box, specify the following path: 
%ProgramFiles(x86)%\Kaspersky Lab\Kaspersky Security 10.1 for Windows Server Admins Tools\ 
18. In the Command line box, type: 
kavfs.msc /avserver:<host_winname> 
19. Click OK 
 
 
20. Click OK again 
 
 L–21 
Lab 3 
 
21. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
22. Make sure that the Kaspersky Security 10.1 Console starts and automatically connects to the target server 
 
 
Conclusion 
In this lab, we have installed Kaspersky Security 10.1 Console on the administrator’s workstation. Also, we’ve created a utility 
in Kaspersky Security Center that enables the administrator to connect to the necessary server through Kaspersky Security 10.1 
Console in a single click. 
 
L–22 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Lab 4. 
How to configure updates and on-demand 
scanning 
Scenario. The administrator has installed Kaspersky Security 10.1 for Windows Server through Kaspersky Security Center on 
the servers, and needs to configure remote management through group tasks and policies now. The administrator is to 
configure centralized updates for the databases and modules of Kaspersky Security 10.1 for Windows Server, and create group 
on-demand scan tasks to begin with. 
Contents. In this lab, we will: 
1. Complete the Managed Application Quick Start Wizard 
2. Create a module update task 
3. Create a full scan task for servers 
Task A: Complete the Managed Application Quick Start Wizard 
After the plug-in of Kaspersky Security 10.1 for Windows Server is installed, a new wizard appears in Kaspersky Security 
Center Administration Console: Managed Application Quick Start Wizard. You can start it from the shortcut menu of 
the Administration Server. The wizard creates a policy and tasks for Kaspersky Security 10.1 for Windows Server. 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
1. On the shortcut menu of the Administration Server node, click All Tasks | Managed Application Quick Start Wizard 
 
 
 L–23 
Lab 4 
 
 
2. Click Next 
 
3. Select Kaspersky Security 10.1 for 
Windows Server 
4. Click Next 
 
5. Click Finish 
6. Open the Managed devices node and switch to the Tasks tab 
 
L–24 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
7. Make sure that two tasks of Kaspersky Security 10.1 for Windows Server have appeared there: 
— Quick Scan task for Windows Server 
— Update task for Windows Server 
 
 
8. Open the properties of the Update task for 
Windows Server 
9. Change its name to Database update – 
KSWS 10.1 
10. Switch to the Schedule section 
 
11. Make sure that the check box Run by 
schedule is selected 
12. Make sure that Frequency is set to After 
Administration Server has retrieved 
updates 
13. Click OK 
 
 L–25 
Lab 4 
 
14. Open the properties of the Quick Scan task for Windows Server 
 
 
15. Change its name to Critical Areas Scan – 
KSWS 10.1 
16. Switch to the Schedule section 
 
17. Select the check box Run by schedule 
18. Make the task start Daily, every 1 day at 
00:00 
19. Click OK 
 
L–26 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task B: Create a module update task 
In this task, we will create a task that will update the modules of Kaspersky Security 10.1 for Windows Server. 
The task is performed on Alex-Desktop. 
 
20. Click the button Create a task 
21. Under Kaspersky Security 10.1 for Windows Server, select 
the Software Modules Update task 
22. Click Next twice 
 
23. Leave the update source unchanged 
24. Click Next 
 
 L–27 
Lab 4 
 
 
25. Leave the update settings unchanged 
26. Click Next 
 
27. Select the check box Run by schedule 
28. Make sure that Frequency is set to After Administration 
Server has retrieved updates 
29. Click Next twice 
 
30. Type Software Modules Update – KSWS 10.1 for the task 
name 
31. Click Next 
 
L–28 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
32. Click Finish 
 
Task C: Create a full scan task for servers 
In this task, you will create a full scan task for Kaspersky Security 10.1 for Windows Server. 
 
 L–29 
Lab 4 
 
The task is performed on Alex-Desktop. 
 
33. Click the button Create a task 
34. Under Kaspersky Security 10.1 for Windows Server, select 
the On-Demand Scan task 
35. Click Next twice 
 
36. Delete all scan areas 
37. Add the My Computer scan area 
38. Click Next 
 
39. Clear the check box Consider task as critical areas scan 
40. Click Next 
 
L–30 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
41. Select the check box Run by schedule 
42. Configure the task to start Weekly, every Friday at 00:00 
43. Click Next twice 
 
44. Type Full Scan – KSWS 10.1 for the task name 
45. Click Next 
 
46. Click Finish 
 
 L–31 
Lab 5 
 
 
Conclusion 
By default, Kaspersky Security 10.1 for Windows Server is not managed centrally, and policies and tasks need to be created 
manually. In this lab, we’ve organized centralized updates for Kaspersky Security 10.1 for Windows Server databases and 
modules, and created tasks that will periodically scan critical areas and all local drives of the servers. 
 
Lab 5. 
How to configure Real-Time Protection 
Scenario. The administrator has installed Kaspersky Security 10.1 for Windows Server through Kaspersky Security Center on 
the servers, configured centralized updates for Kaspersky Security 10.1 for Windows Server databases and modules, and 
created group on-demand scan tasks. To complete the deployment, the administrator is to configure real-time protection in the 
policy of Kaspersky Security 10.1 for Windows Server. 
Contents. In this lab, we will: 
1. Configure a notification about module updates 
2. Enable Kaspersky Security Network 
3. Make sure that the KSN task is running 
 
L–32 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task A: Configure a notification about module updates 
In this task, you will configure notifications about module updates available for Kaspersky Security 10.1 for Windows Server. 
The best choice is e-mail notification. 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Make sure that it contains the policy Kaspersky Security 10.1 for Windows Server 
3. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
4. Open the Event configuration section and 
switch to the Warning tab 
 
 L–33 
Lab 5 
 
 
5. Select the following event types: 
— New scheduled software modules 
update is available 
— New critical software modules update 
is available 
6. Click the Properties button 
 
7. Select the Notify by email check box 
8. Click OK 
 
9. Make sure that the envelope icons have 
appeared next to the events 
 
L–34 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task B: Enable Kaspersky Security Network 
In this task, you will enable Kaspersky Security Network in the policy of Kaspersky Security 10.1 for Windows Server. 
The task is performed on Alex-Desktop. 
 
10. Switch to the Real-time server protection 
section 
11. In the KSN Usage area, click Data 
processing 
 
12. Select the check box Accept the terms of 
the Kaspersky Security Network 
Statement 
13. Click OK 
 
14. In the KSN Usage area, click Settings 
 
 L–35 
Lab 5 
 
 
15. Switch to the Task Management tab 
16. Select the check box Run by schedule 
17. Make surethat Frequency is set to At 
application launch 
18. Click OK 
 
19. Close the lock in the KSN Usage area 
20. Click OK 
21. Wait for the policy to be enforced 
 
 
 
L–36 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task C: Make sure that the KSN task is running 
In this task, we will make sure that the KSN task has started. 
The task is performed on WSL. 
22. Press CTRL+ALT+INS 
 
23. Enter the password Ka5per5Ky 
24. Press ENTER 
 
25. Wait for the command line interface to open 
26. Select the installation folder of Kaspersky Security 10.1 for Windows Server 
cd c:\Program Files (x86)\Kaspersky Lab\Kaspersky Security 10.1 for Windows Server\ 
 
 
 L–37 
Lab 6 
 
27. Carry out 
kavshell.exe task 
28. Make sure that the ksn-service task is Running 
 
Conclusion 
In this lab, we have configured the policy of Kaspersky Security 10.1 for Windows Server. Some of the components do not 
start automatically by default. For instance, to start the KSN Usage task, you must accept the KSN Statement. We made the 
necessary changes to the policy; as soon as it was enforced, the new settings were applied to all servers, and the KSN Usage 
task started automatically. 
Lab 6. 
How to test protection of Docker containers 
Scenario. Docker is an application container technology. Windows Server operating systems support Docker containers since 
version 2016. Each container is created from an image and consists of the operating system, user’s files, and metadata. 
Kaspersky Security 10.1 for Windows Server can detect malicious files in Docker containers. The administrator is to deploy a 
Windows Server Core container, try to copy a malicious file into the container, and make sure that Kaspersky Security 10.1 for 
Windows Server detects and deletes it. 
Contents. In this lab, we will: 
1. Configure the Real-Time File Protection task 
2. Test protection of Docker containers without accessing a malicious file 
3. Test protection of Docker containers when a malicious file is accessed 
 
L–38 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task A: Configure the Real-Time File Protection task 
In this task, you will copy eicar.com to the Docker computer. For this purpose, first of all, exclude the destination folder from 
Real-Time Protection in Kaspersky Security 10.1 for Windows Server. 
The task is performed first on Alex-Desktop, and then on Docker. 
The DC and Security-Center machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
3. Switch to the Real-Time Server Protection 
section 
4. In the Real-Time File Protection area, click 
Settings 
 
 L–39 
Lab 6 
 
 
5. Switch to the Protection scope tab 
6. Click Add 
 
7. Add the folder C:\Temp\ 
8. Click OK 
 
9. Deselect the folder C:\Temp\ 
10. Click OK twice 
 
L–40 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
11. Wait for the policy to be enforced 
 
 
12. Open the shared folder \\Docker\c$\Temp\ 
 
13. Copy the eicar.com file into it (the file is 
located on the desktop, in the Eicar folder) 
Task B: Test protection of Docker containers without accessing a malicious 
file 
In this task, we will deploy a Windows Server Core container and try to copy a malicious file into it. 
The task is performed on Docker. 
14. Run PowerShell as administrator 
 
 L–41 
Lab 6 
 
15. Carry out the following command: 
docker run -it -v c:\temp:c:\temp --name container_1 microsoft/windowsservercore 
 
16. Wait for Docker to create container_1 
17. Carry out the following commands: 
cd c:\temp 
dir 
18. Make sure that the eicar.com file is still there 
 
19. Copy the eicar.com file to the root of drive C:\ 
copy eicar.com c:\ 
20. Carry out the following commands: 
cd c:\ 
dir 
21. Make sure that the eicar.com file is missing from the root of drive C:\ (The file has been deleted) 
 
 
L–42 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
22. Carry out the following commands: 
exit 
docker ps -a 
23. Notice the value of CONTAINER ID 
 
Switch to the Alex-Desktop machine. 
24. Return to Kaspersky Security Center Administration Console 
25. Open the KSWS group and switch to the Devices tab 
26. On the shortcut menu of the Docker computer, click Custom tools | KSWS 
 
 
 L–43 
Lab 6 
 
27. In the Server protection area, next to Detected, click the figure “1” (the actual number may differ) 
 
 
28. Switch to the Events tab 
29. Consult the detection events 
30. Make sure that the detected object is 
named [ID of Container_1]\eicar.com 
 
Task C: Test protection of Docker containers when a malicious file is 
accessed 
In this task, we will deploy another Windows Server Core container and try to copy a malicious file into it. 
 
L–44 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
The task is performed first on Alex-Desktop, and then on Docker. 
31. Open the Managed devices node and switch to the Policies tab 
32. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
33. Switch to the Real-time server protection 
section 
34. In the Real-Time File Protection area, click 
Settings 
 
35. Switch to the Task management tab 
36. Clear the check box Run by schedule 
37. Click OK twice 
 
 L–45 
Lab 6 
 
38. Wait for the policy to be enforced 
 
Switch to the Docker computer. 
39. Run PowerShell as administrator 
40. Carry out the following command: 
docker run -it -v c:\temp:c:\temp --name container_2 microsoft/windowsservercore 
 
41. Wait for Docker to create container_2 
42. Carry out the following commands: 
cd c:\temp 
dir 
43. Make sure that the eicar.com file is still there 
 
 
L–46 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
44. Copy the eicar.com file to the root of drive C:\ 
copy eicar.com c:\ 
45. Carry out the following commands: 
cd c:\ 
dir 
46. Make sure that the eicar.com file is located in the root directory of drive C:\ 
 
Switch to the Alex-Desktop machine. 
 
47. Open the properties of the Kaspersky Security 
10.1 for Windows Server policy 
48. Switch to the Real-time server protection 
section 
49. In the Real-Time File Protection area, click 
Settings 
 
 L–47 
Lab 6 
 
 
50. Switch to the Task management tab 
51. Select the check box Run by schedule 
52. Click OK twice 
53. Wait for the policy to be enforced 
 
 
L–48 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Switch to the Docker computer. 
54. Carry out the following command: 
type eicar.com 
55. Make sure that access is denied 
 
56. Carry out the following commands: 
exit 
docker ps -a 
57. Notice the values of CONTAINER ID 
 
 
 L–49 
Lab 6 
 
Switch to the Alex-Desktop machine. 
58. Return to Kaspersky Security Center Administration Console 
59. Open the Administration Server node and switch to the Events tab 
60. Click Run selection 
61. Make sure that four events from the Docker computer have appeared in Kaspersky Security Center 
 
 
62. Open the Infected or other object detected 
event 
63. Make sure that the detected object is named [ID 
of Container_2]\eicar.com 
64. Click Close 
 
Conclusion 
In this lab, we have made sure that Kaspersky Security 10.1 for Windows Server can detect malicious files within Docker 
containers. The Real-Time Protection task takes care of that, no additional configuring is necessary. 
 
L–50 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Lab 7. 
How to test protection of Windows Subsystem 
for Linux 
Scenario. Kaspersky Security 10.1 for Windows Server supports Windows Subsystem for Linux: It is a compatibility layer for 
running Linux applicationsin the latest versions of Microsoft Windows. In our environment, Windows Subsystem for Linux is 
based on Ubuntu Server 14.04. The administrator is to start a test malicious file in Windows Subsystem for Linux and make 
sure that Kaspersky Security 10.1 for Windows Server detects and deletes it. 
Contents. In this lab, we will make sure that Kaspersky Security 10.1 for Windows Server can detect malicious files that run 
within Windows Subsystem for Linux. 
Task A: Make sure that Kaspersky Security 10.1 for Windows Server can 
detect malicious files that run within Windows Subsystem for Linux 
In this task, we will try to compile malicious code from Windows Subsystem for Linux that is running under Windows Server 
2016. 
The task is performed first on Alex-Desktop, and then on WSL. 
The DC and Security-Center machines must be powered on. 
 
1. Open the \\WSL\c$\Test\ shared folder 
 
2. Copy the eicar_drop_kl_edu.cpp file into it 
(the file is located on the desktop, in the 
Eicar folder) 
Switch to the WSL machine 
 
3. Press CTRL+ALT+INS 
 
4. Enter the password Ka5per5Ky 
5. Press ENTER 
 
 L–51 
Lab 7 
 
6. Wait for the command line interface to open 
7. Carry out 
powershell 
 
8. Carry out 
wsl 
 
9. Carry out 
cp /mnt/c/Test/eicar_drop_kl_edu.cpp /tmp/ 
 
10. Carry out 
cd /tmp/ 
 
11. Carry out 
g++ eicar_drop_kl_edu.cpp -o eicar_dropper 
 
 
L–52 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
12. Carry out 
./eicar_dropper 
13. Make sure that Kaspersky Security 10.1 for Windows Server shows a message that the malicious file has been blocked and 
deleted 
 
Switch to the Alex-Desktop machine. 
14. Return to the Kaspersky Security Center Administration Console 
15. Open the Administration Server node and switch to the Events tab 
16. Click Run selection 
17. Make sure that four events from the WSL computer have appeared in Kaspersky Security Center 
 
 
 L–53 
Lab 7 
 
18. On the shortcut menu of the Infected or other object detected event, click Go to device 
 
19. On the shortcut menu of the WSL computer, click Custom tools | KSWS 
 
 
L–54 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
20. In the Server protection area, next to Detected, click the figure “1” (the actual number may differ) 
 
 
21. Switch to the Events tab 
22. Consult the detection events 
23. Click Close 
Conclusion 
In this lab, we have made sure that Kaspersky Security 10.1 for Windows Server can detect malicious files that run within 
Windows Subsystem for Linux. The Real-Time Protection task takes care of that, no additional configuring is necessary. 
Lab 8. 
How protection of server shared folders works 
Scenario. The administrator remotely connects from his workstation to a shared folder on a server where Kaspersky Security 
10.1 for Windows Server is installed. The folder is shared with Write permissions, and the administrator tries to copy the 
eicar.com file into it. Copying starts, but the connection is terminated after a while. Another attempt to connect to the shared 
folder fails. The administrator opens Kaspersky Security Center and finds a recent event informing that his computer is now 
listed among untrusted hosts. After that, the administrator manually deletes the computer from the list of untrusted hosts and 
makes sure that the network folder is accessible again. 
 
 L–55 
Lab 8 
 
Contents. In this lab, we will make sure that Kaspersky Security 10.1 for Windows Server can block remote computers from 
which malicious activities have been attempted. 
Task A: Make sure that Kaspersky Security 10.1 for Windows Server can 
block remote computers 
In this task, we will imitate copying a malicious file to a shared folder on the server where Kaspersky Security 10.1 for 
Windows Server is running. 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
3. Switch to the Real-Time Server Protection 
section 
4. In the Real-Time File Protection area, click 
Settings 
 
L–56 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
5. Select the check box List hosts showing 
malicious activity as untrusted 
6. Click OK twice 
7. Wait for the policy to be enforced 
 
 
8. Open the shared folder \\10.28.0.20\Test\ 
 
 L–57 
Lab 8 
 
 
9. Copy the eicar.com file into it (the file is 
located on the desktop, in the Eicar folder) 
 
10. Wait for the connection to be terminated 
 
11. Try to open \\10.28.0.20\Test\ shared folder 
again 
12. Make sure that the connection cannot be 
established 
13. Click Close 
14. Return to Kaspersky Security Center Administration Console 
15. Open the Administration Server node and switch to the Events tab 
16. Click Run selection 
17. Find the event Host listed as untrusted 
 
 
L–58 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
18. Open the event and read its description 
19. Click Close 
20. On the shortcut menu of the Host listed as untrusted event, click Device Properties 
 
 
21. Switch to the Applications section 
22. Select Kaspersky Security 10.1 for 
Windows Server 
23. Click the Properties button 
 
 L–59 
Lab 8 
 
 
24. Switch to the Supplementary section 
25. In the Storages area, click Settings 
 
26. Switch to the Blocked host storage tab 
27. Click Blocked host list 
 
28. Select the Alex-Desktop computer 
29. Click Clear entire list 
 
30. Click Close 
 
L–60 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
31. Close all windows 
32. Try to open \\10.28.0.20\Test\ shared folder 
again 
33. Make sure that the connection has been 
established 
Conclusion 
In this lab, we tested protection of shared folders on a server and made sure that Kaspersky Security 10.1 for Windows Server 
can block remote computers that attempt malicious activities. 
Lab 9. 
How to configure the Anti-Cryptor component 
Scenario. The administrator has decided to test protection of shared folders against remote encryption and connects from a 
workstation to a shared folder on a server where Kaspersky Security 10.1 for Windows Server is installed. The network folder 
contains files and is shared with Write permissions. The administrator tries to encrypt text files over the network using an 
encryption utility installed on his workstation. As soon as the encryption process starts, the connection is terminated. Another 
attempt to connect to the shared folder fails. The administrator opens Kaspersky Security Center and finds a recent event 
informing that his computer is now listed among untrusted hosts. After that, the administrator manually deletes the computer 
from the list of untrusted hosts and makes sure that the network folder is accessible again. 
Contents. In this lab, we will: 
1. Enable the Anti-Cryptor component 
2. Make sure that the Anti-Cryptor task can detect encryption activities 
Task A: Enable the Anti-Cryptor component 
In this task, you will enable the Anti-Cryptor component. 
file://///10.28.0.20/Test/
 
 L–61 
Lab 9 
 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
3. Switch to the Network activity control 
section 
4. In the Anti-Cryptor area, click Settings 
 
5. Switch to the Task management tab 
6. Select the check box Run by schedule 
7. Make sure that Frequency is set to At 
application launch 
8. Click OK 
 
L–62 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
9. Close the lock in the Anti-Cryptor area 
10.Click OK 
11. Wait for the policy to be enforced 
 
Task B: Make sure that the Anti-Cryptor task can detect encryption activities 
In this task, we will try to remotely encrypt text files in a shared folder on a server where Kaspersky Security 10.1 for 
Windows Server is running. 
 
 L–63 
Lab 9 
 
The task is performed on Alex-Desktop. 
 
12. Open the shared folder \\10.28.0.20\Test\ 
 
13. Select all files (CTRL+A) 
14. Right-click them and select AES Encrypt on 
the shortcut menu 
 
15. Type the password: 123 
16. Click OK 
 
17. Make sure that the connection gets disrupted 
instantly 
 
18. Try to open the shared folder 
\\10.28.0.20\Test\Docs\ again 
19. Make sure that the connection cannot be 
established 
20. Click Close 
 
L–64 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
21. Return to Kaspersky Security Center Administration Console 
22. Open the Administration Server node and switch to the Events tab 
23. Click Run selection 
24. On the shortcut menu of the recent event Host listed as untrusted, click Go to device 
 
25. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
 
 L–65 
Lab 9 
 
26. In the Control area, next to Malicious encrypting attempts detected, click the figure “9” (the actual number may differ) 
 
 
27. Switch to the Events tab 
28. Open the highest event 
 
29. Read the description 
30. Click OK 
31. Click Close 
 
L–66 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
32. Go to the Storages | Blocked Host Storage container 
33. Select computer 10.28.0.20 (Alex-Desktop) 
34. Click the link Unblock selected 
 
35. Make sure that computer 10.28.0.20 (Alex-Desktop) has disappeared from the list 
 
 
36. Try to open the shared folder 
\\10.28.0.20\Test\Docs\ again 
37. Make sure that the connection has been 
established 
 
Conclusion 
In this lab, we’ve tested the Anti-Cryptor component, which can detect encryption activities and add the attacking computer to 
the list of untrusted hosts. Kaspersky Security 10.1 for Windows Server checks this list and blocks the respective computer. 
file://///10.28.0.20/Test/
 
 L–67 
Lab 10 
 
Lab 10. 
How to set Traffic Security to Driver Interceptor 
mode 
Scenario. A new component has appeared in Kaspersky Security 10.1 for Windows Server: Traffic Security, which permits 
scanning web and mail traffic. The component operates in several modes and is designed mainly to protect servers that provide 
users with Remote Desktop Services. Driver Interceptor is a Traffic Security mode where a special driver intercepts traffic. 
The administrator is to enable the Traffic Security component, then make sure that notifications for terminal users are also 
enabled, and test how Kaspersky Security 10.1 for Windows Server blocks unwanted websites. 
Contents. In this lab, we will: 
1. Enable notifications for terminal users 
2. Enable the Traffic Security component 
3. Verify that unwanted websites are blocked 
4. Verify that Tor networks are blocked 
Task A: Enable notifications for terminal users 
In this task, we will learn how to configure notifications for terminal users in the policy. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and RDS machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–68 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
3. Switch to the Logs and notifications 
section 
4. In the Event notifications area, click 
Settings 
 
5. Select the Object detected event type 
6. Make sure that the Notify users: 
By using terminal service check box is 
selected 
7. Click OK 
 
8. Close the lock in the Event notifications 
area 
9. Click OK 
 
 L–69 
Lab 10 
 
Task B: Enable the Traffic Security component 
In this task, we will enable the Traffic Security component and switch it to the Driver Interceptor mode. 
The task is performed on Alex-Desktop. 
 
10. Switch to the Real-time server 
protection section 
11. In the Traffic Security area, click 
Settings 
 
12. Change the Task mode to Driver 
Interceptor 
13. Click OK 
 
14. Switch to the Task management tab 
15. Select the check box Run by schedule 
16. Make sure that Frequency is set to At 
application launch 
17. Click OK 
 
L–70 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
18. Close the lock in the Traffic Security area 
19. Click OK 
20. Wait for the policy to be enforced 
 
 
 L–71 
Lab 10 
 
Task C: Verify that unwanted websites are blocked 
In this task, we will prohibit access to websites that belong to the “Social networks” category. 
The task is performed on Alex-Desktop. 
21. Start Internet Explorer 
22. Type https://rds.abc.lab/rdweb in the address bar 
23. Press ENTER 
24. Click the link Go on to the webpage (not recommended) 
 
25. Type the abc\Alex username and Ka5per5Ky password 
26. Click Sign in 
 
 
L–72 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
27. Click the Google Chrome icon 
 
 
28. Click Connect 
29. In the address bar, type https://www.facebook.com 
30. Press ENTER 
31. Make sure that the page opens 
 
 
 L–73 
Lab 10 
 
32. Return to Kaspersky Security Center Administration Console 
33. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
34. Switch to the Real-time server protection 
section 
35. In the Traffic Security area, click Rules list 
 
36. Switch to the Categorization tab 
37. Select the check box Apply rules for web 
traffic category control 
38. Find the Social networks category in the list 
and deselect it 
39. Click OK twice 
 
L–74 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
40. Wait for the policy to be enforced 
 
41. Return to the Google Chrome browser 
42. Try to open https://www.facebook.com once again 
43. Make sure that the page has been blocked 
 
Task D: Verify that Tor networks are blocked 
In this task, we will make sure that access to Tor networks is prohibited by default. 
The task is performed first on Alex-Desktop, and then on RDS. 
44. Return to Kaspersky Security Center Administration Console 
 
 L–75 
Lab 10 
 
45. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
46. Switch to the Real-time server protection 
section 
47. In the Traffic Security area, click Rules list 
 
48. Note that the list contains a rule that prohibits 
Tor certificates. The rule is enabled by 
default 
49. Click OK twice 
 
L–76 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Switch to the RDS computer. 
 
50. Log on to the system under the abc\Alex 
account with the password Ka5per5Ky 
51. Open the C:\Temp\ folder 
52. Start the installer of the Tor browser 
 
53. Click OK 
 
54. Click Install 
 
55. Click Finish 
 
56. Click Connect 
 
 L–77 
Lab 10 
 
 
57. Make sure that the browser cannot connect to 
the Tor network 
Switch to the Alex-Desktop machine. 
58. Return to Kaspersky Security Center Administration Console 
59. Open the KSWS group and switch to the Devices tab 
60. On the shortcut menu of the RDS computer, click Custom tools | KSWS 
 
 
L–78 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
61. In the Server protection area, next to Certificates blocked, click the figure “7” (the actual number may differ) 
 
 
62. Switch to the Events tab 
63. Consult the detection events 
64. Open the latest event 
 
65. Read the event description 
66. Close all windows 
Conclusion 
In this lab, you have learned how to enable the Traffic Security component and switch it to the Driver Interceptor mode. Also, 
we demonstratedthat Kaspersky Security 10.1 for Windows Server can block unwanted websites and limit access to Tor 
networks. 
 
 L–79 
Lab 11 
 
Lab 11. 
How to configure Traffic Security to scan mail 
traffic 
Scenario. The Traffic Security component can process not only web traffic, but also email. Kaspersky Security 10.1 for 
Windows Server can scan Microsoft Outlook 2010/2013/2016 messages using a special plug-in, which is to be installed 
additionally. The administrator is to install Kaspersky Security 10.1 Add-in for Microsoft Outlook using Kaspersky Security 
Center, connect to the terminal server where Microsoft Outlook 2013 is published, send a message with a malicious file and a 
phishing link, and check how Kaspersky Security 10.1 for Windows Server will process undesired objects. 
Contents. In this lab, we will: 
1. Install Kaspersky Security 10.1 Add-in for Microsoft Outlook 
2. Enable mail threat protection 
3. Verify that Kaspersky Security 10.1 for Windows Server intercepts mail traffic 
Task A: Install Kaspersky Security 10.1 Add-in for Microsoft Outlook 
In this task, we will install Kaspersky Security 10.1 Add-in for Microsoft Outlook using the remote installation task. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and RDS machines must be powered on. 
1. Return to Kaspersky Security Center Administration Console 
2. Select the Advanced | Remote installation | Installation packages container 
3. Click the Create installation package button 
 
 
L–80 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
4. Click the middle button: Create an installation 
package for specified executable file 
 
5. Type KSWS 10.1 Microsoft Outlook Add-in 
for the package name 
6. Click Next 
 
7. Click Browse 
8. Select the file 
C:\ks4ws\10.1.0.622\english\email_plugin\ksmail_x64.msi 
9. Click Open 
10. In the box Executable file command line 
(optional), type EULA=1 PRIVACYPOLICY=1 
11. Click Next 
 
 L–81 
Lab 11 
 
 
12. Click Finish 
13. Make sure that the new package has appeared on the list 
14. On the shortcut menu of the new package, click Install application 
 
 
L–82 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
15. Click the button Select devices for installation 
 
16. Select the RDS computer 
17. Click Next five times 
 
18. Click Finish 
 
 L–83 
Lab 11 
 
19. Wait for the task to complete successfully 
 
Task B: Enable mail threat protection 
In this task, you will make sure that mail protection is enabled by default. 
The task is performed on Alex-Desktop. 
20. Open the Managed devices node and switch to the Policies tab 
21. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–84 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
22. Switch to the Real-time server 
protection section 
23. In the Traffic Security area, click 
Settings 
 
24. Switch to the Mail threat protection 
tab 
25. Make sure that the Enable mail threat 
protection check box is selected 
26. Click OK twice 
Task C: Verify that Kaspersky Security 10.1 for Windows Server intercepts 
mail traffic 
In this task, we will check how Kaspersky Security 10.1 for Windows Server intercepts mail traffic. 
The task is performed on Alex-Desktop. 
27. Start Internet Explorer 
28. Type https://rds.abc.lab/rdweb in the address bar 
29. Press ENTER 
 
 L–85 
Lab 11 
 
30. Click the link Go on to the webpage (not recommended) 
 
31. Type the abc\Alex username and Ka5per5Ky password 
32. Click Sign in 
 
33. Click the Outlook 2013 icon 
 
 
L–86 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
34. Click Connect 
 
35. Click Next 
 
36. Click Next 
 
37. Specify the following parameters: 
— Your Name—Alex 
— E-mail Address—alex@abc.lab 
— Password—Ka5per5Ky 
38. Click Next twice 
mailto:alex@abc.lab
 
 L–87 
Lab 11 
 
 
39. Click Finish 
 
40. Click Accept 
41. Click FILE 
42. Click Options 
 
 
L–88 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
43. Switch to the Add-Ins section 
44. Make sure that Kaspersky Security 
Outlook Addin is present in the list 
45. Click OK 
46. Run PowerShell as administrator 
47. Carry out the following commands: 
cd C:\Test\ 
.\mailsend.exe -smtp 10.28.0.10 -f hacker@gmail.com -t alex@abc.lab 
-sub Hello -attach C:\Test\eicar_txt.rar 
 
48. Return to the mail client and open the message that has arrived 
49. Make sure that you are informed about the detected malicious object 
50. Click OK 
 
 
 L–89 
Lab 11 
 
51. Note that eicar_txt.rar has been renamed to eicar_txt.rar.htm 
 
52. Return to PowerShell 
53. Carry out the following command: 
.\mailsend.exe -smtp 10.28.0.10 -f hacker@gmail.com -t alex@abc.lab 
-sub Hello 
54. Type the following string: 
http://www.kaspersky.com/test/aphish_w/1 
55. Press ENTER 
56. Type one dot “.” 
57. Press ENTER 
 
 
L–90 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
58. Return to the mail client and open the message that has arrived 
59. Make sure that the test phishing link has been blocked 
 
Conclusion 
In this lab, we have demonstrated how to install Kaspersky Security 10.1 Add-in for Microsoft Outlook using Kaspersky 
Security Center and how Traffic Security scans messages for malicious objects and phishing links. 
 
Lab 12. 
How to configure Exploit Prevention 
Scenario. A new component has appeared in Kaspersky Security 10.1 for Windows Server: Exploit Prevention, which protects 
processes against malicious code intrusions. The component is implemented as a service. When it detects an attempt to intrude 
into a protected process, it can either stop it or notify the administrator. The administrator is to enable the Exploit Prevention 
component and add a new process to the list of protected processes, connect to the terminal server where Microsoft Word is 
published, try to open a file with an exploit and make sure that Kaspersky Security 10.1 for Windows Server will react to the 
malicious activity and stop the process. 
Contents. In this lab, we will: 
1. Enable protection against exploits 
2. Make sure that protection against exploits works correctly 
 
 L–91 
Lab 12 
 
Task A: Enable protection against exploits 
In this task, you will enable the Exploit Prevention component and add a new process to the list of protected processes. 
The task is performed on Alex-Desktop. 
The DC and Security-Center machines must be powered on. 
1. Open the Managed devices node and switch to the Policies tab 
2. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
3. Switch to the Real-time server 
protection section 
4. In the Exploit Prevention area, click 
Settings 
 
L–92 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
5. Select the check box Prevent vulnerable 
processes exploit 
6. Switch the mode to Terminate on 
exploit 
7. Open the Protected processes tab 
8. Click Browse 
9. Specify the following path to the process: 
\\RDS\c$\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE 
10. Click Add 
 
file://///RDS/c$/Program%20Files/Common%20Files/Microsoft%20Shared/EQUATION/EQNEDT32.EXE
 
 L–93 
Lab 12 
 
 
11. Scroll the list of processes down 
12. Make sure that the EQNEDT32.EXE 
process has appeared on the list 
13. Click OK 
 
14. Close the lock in the Exploit Prevention 
area 
15. Click OK 
 
16. In the Real-Time File Protection area, 
click Settings 
 
L–94 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
17. Switch to the Task management tab 
18. Clear the check box Run by schedule 
19. Click OK twice 
20. Wait for the policy to be enforced 
 
Task B: Make sure that protection against exploits works correctlyIn this task, we will try to run an exploit in a terminal session and make sure that Kaspersky Security 10.1 for Windows Server 
will react to it. 
The task is performed on Alex-Desktop. 
21. Start Internet Explorer 
22. Type https://rds.abc.lab/rdweb in the address bar 
23. Press ENTER 
 
 L–95 
Lab 12 
 
24. Click the link Go on to the webpage (not recommended) 
 
25. Type the abc\Alex username and Ka5per5Ky password 
26. Click Sign in 
 
27. Click the Word 2013 icon 
 
 
L–96 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
28. Click Connect 
29. Click the link Open Other Documents 
 
30. Select Computer 
31. Click the button Browse 
 
 
 L–97 
Lab 12 
 
 
32. Specify the path to the file: 
C:\Temp\CVE-2017-11882\ridter_cmd_1.doc 
33. Click Open 
 
34. Make sure that a message informing of a 
detected exploit attempt has appeared 
35. Click OK 
36. Return to Kaspersky Security Center Administration Console 
37. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–98 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
38. In the Real-Time File Protection area, click 
Settings 
 
39. Switch to the Task management tab 
40. Select the check box Run by schedule 
41. Click OK twice 
42. Open the KSWS group and switch to the Devices tab 
43. On the shortcut menu of the RDS computer, click Custom tools | KSWS 
 
 
 L–99 
Lab 13 
 
44. Go to the Logs and notifications | Security log container 
45. Select and open the upper event 
 
 
46. Read the description 
47. Click OK 
 
Conclusion 
In this lab, you have learned how to enable the Exploit Prevention component and how to add a new process to the list of 
protected processes. Then you tried to exploit a vulnerability in Microsoft Office; however, Kaspersky Security 10.1 for 
Windows Server detected the malicious activity, stopped the process, and notified the user in the terminal session. 
Lab 13. 
How to enable Applications Launch Control in 
the test mode 
Scenario. ABC Inc. plans to enable Applications Launch Control on the servers to reinforce protection. The plan is to draw up 
a white list of applications based on the reference servers, and then make sure that the list ensures correct operation of all 
servers. 
 
L–100 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Contents. In this lab, we will: 
1. Create a shared folder 
2. Configure a rule generation task 
3. Run the task and import rules to the policy 
4. Enable Applications Launch Control in the test mode 
Task A: Create a shared folder 
The task that generates rules for Applications Launch Control scans reference computers and outputs the results into an .xml 
file. The task saves the file in a local or network folder. Then the rules will need to be imported from the file to the policy. If 
more than one reference computer is used, it makes sense to save the files into a network folder to have all of them in a single 
location. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and Docker machines must be powered on. 
 
1. Open Windows Explorer and create a folder 
named Rules in the root of drive С:\ 
 
2. Open the properties of the Rules folder and 
switch to the Sharing tab 
3. Click Share 
 
 L–101 
Lab 13 
 
 
4. Click Share 
 
5. Click Done 
 
6. Click Close 
Task B: Configure a rule generation task 
Typically, it is enough for the Rule Generator task to scan only reference servers rather than all servers. Therefore, the task 
should be created for specific computers rather than for a group. Specify the scanning parameters, reference computers, and the 
output folder in the task properties. 
 
L–102 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
The task is performed on Alex-Desktop. 
7. Open Kaspersky Security Center Administration Console 
8. Go to the Tasks node 
9. Click Create a task 
 
 
10. Under Kaspersky Security 10.1 for Windows Server, select 
Rule Generator for Applications Launch Control 
11. Click Next 
 
 L–103 
Lab 13 
 
 
12. Type the Initial_ rule name prefix 
13. Delete all folders from the scan scope 
14. Add the %SystemDrive% environment variable 
15. Select all file types, except DLL 
16. Click Next 
 
17. Select the check box Add allowing rules to the list of 
Applications Launch Control rules 
18. Specify the path to the file 
\\Alex-Desktop\Rules\rules.xml 
19. Click Next twice 
 
20. Click the top button Select networked devices detected by 
Administration Server 
file://///Alex-Desktop/Rules/rules.xml
 
L–104 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
21. Select the Security-Center computer 
22. Click Next 
 
23. Specify a user who has write access to the folder \\Alex-
Desktop\Rules: 
Username ABC\Administrator, password Ka5per5Ky 
24. Click Next 
 
25. Click Next 
 
 
 L–105 
Lab 13 
 
 
26. Click Finish 
 
Task C: Run the task and import rules to the policy 
We will run the created task and import the resulting list of rules to the policy. 
The task is performed on Alex-Desktop. 
27. Start the task Rule Generator for Applications Launch Control 
28. Wait for the task to complete successfully 
 
 
L–106 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
29. Open the Managed devices node and switch to the Policies tab 
30. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
31. Switch to the Local activity control 
section 
32. In the Applications Launch Control 
area, click the Settings button 
 
 L–107 
Lab 13 
 
 
33. Click the Rules list button 
 
34. Delete the two default rules 
 
35. Click Add | Import rules from XML 
file | Merge with existing rules 
 
L–108 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
36. In the folder С:\Rules, select the *.xml 
file 
37. Click Open 
 
38. Click Save 
Task D: Enable Applications Launch Control in the test mode 
The list of rules generated based on the reference computers may fail to cover all the available configurations of servers 
protected with Kaspersky Security 10.1 for Windows Server. If you enable Applications Launch Control in the fully 
operational mode straight off, it may turn out that not all of the required files are allowed on some devices, and they may work 
incorrectly as a result. Therefore, Applications Launch Control is to be enabled in the Statistics Only mode to begin with. 
 
 L–109 
Lab 13 
 
The task is performed on Alex-Desktop. 
 
39. Make sure that the component is switched 
to the Statistics only mode 
40. Switch to the Task management tab 
 
41. Select the check box Run by schedule 
42. Make sure that Frequency is set to At 
application launch 
43. Click OK 
 
44. Close the lock in the Applications Launch 
Control area 
45. Click OK 
 
L–110 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
46. Wait for the policy to be enforced 
 
Conclusion 
We’ve completed the initial setup of Applications Launch Control. In the Statistics Only mode, Kaspersky Security 10.1 for 
Windows Server will not block any programs. If a program that is not allowed by the rules is started, Kaspersky Security 10.1 
for Windows Server will just generate an event and send it to the Administration Server. The administrator can learn from 
these events whether the Applications Launch Control rules allow all the necessary applications. 
Lab 14. 
How to enable Applications Launch Control in 
the Default Deny mode 
Scenario. Applications Launch Control has been enabled in the Statistics Only mode. The administrator is to consult the list of 
blocked run events and adjust the rules to make all the necessary programs allowed. When the testing is completed, switch 
Applications LaunchControl to the fully operational mode. 
Contents. In this lab, we will: 
1. Test the Statistics Only mode 
2. Create a selection for the test events 
3. Add rules based on the test events 
4. Switch Applications Launch Control to the Default Deny mode 
5. Verify that unallowed programs cannot be started 
Task A: Test the Statistics Only mode 
To test Applications Launch Control in the Statistics Only mode, start a program that was not installed on the reference 
computer on one of the servers protected with Kaspersky Security 10.1 for Windows Server. 
 
 L–111 
Lab 14 
 
The task is performed on Docker. 
The DC, Security-Center, and Alex-Desktop machines must be powered on. 
 
1. Log on to the system under the abc\Alex account with the 
password Ka5per5Ky 
2. Run the PuTTY utility (the putty.exe file is located on 
the desktop) 
3. Make sure that the utility has started successfully 
4. Click Cancel 
Task B: Create a selection for the test events 
In the Statistics Only mode, information on blocked launches is sent to the Administration Server as events. Let’s create a 
selection of events about the programs that were blocked in the Statistics Only mode. 
The task is performed on Alex-Desktop. 
5. Return to Kaspersky Security Center Administration Console 
6. Open the Administration Server node and switch to the Events tab 
7. Click Create a selection 
 
 
L–112 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
8. Enter the selection name: 
KSWS – Application Launch Control 
9. Switch to the Events section 
 
10. In the Application name list, select 
Kaspersky Security 10.1 for Windows 
Server 
11. Select the Warning severity 
12. Click the Clear all button 
13. Select the Statistics Only mode: application 
launch denied event 
14. Click OK 
15. Click Run selection 
16. Make sure that the selection shows the PuTTY start event 
 
 
 
 
 L–113 
Lab 14 
 
Task C: Add rules based on the test events 
If the Administration Server keeps receiving “Statistics Only mode: application launch denied” events, it is possible that not all 
of the necessary programs have been allowed. The administrator can consult the selection of these events and generate new 
launch rules based on them. 
The task is performed on Alex-Desktop. 
17. On the selection’s shortcut menu, click Export 
 
 
18. Click Browse 
19. Specify the path to the file 
C:\Rules\Events.txt 
20. Click Next twice 
 
L–114 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
21. Open the Managed devices node and switch 
to the Policies tab 
22. Open the properties of the Kaspersky 
Security 10.1 for Windows Server policy 
23. Switch to the Local activity control section 
24. In the Applications Launch Control area, 
click the Settings button 
 
25. Click the Rules list button 
 
26. Click Add | Import data of blocked 
applications from Kaspersky Security 
Center report | Merge with existing rules 
 
 L–115 
Lab 14 
 
 
27. In the С:\Rules\ folder, select the Events.txt 
file 
28. Click Open 
 
29. Scroll the list of rules down to the bottom 
30. Make sure that the new rule has been added 
31. Click Save 
Task D: Switch Applications Launch Control to the Default Deny mode 
As soon as the rules’ testing has been completed, Applications Launch Control can be switched to the full-fledged operational 
mode: Default Deny. 
The task is performed on Alex-Desktop. 
 
32. Switch the component to the Active mode 
33. Click OK twice 
 
L–116 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
34. Wait for the policy to be enforced 
 
Task E: Verify that unallowed programs cannot be started 
Make sure that Applications Launch Control blocks programs for which allow rules are not configured. 
The task is performed on Docker. 
 
35. Log on to the system under the abc\Alex account with 
the password Ka5per5Ky 
36. Run the PuTTY utility (the putty.exe file is located on 
the desktop) 
37. Make sure that the utility has started successfully 
38. Click Cancel 
 
39. Run the AdbeRdr950_en_US.exe file (it is located on 
the desktop) 
40. Make sure that the file is prohibited from starting 
41. Click OK 
 
Conclusion 
In the Default Deny mode, Applications Launch Control blocks any program that is not allowed according to the rules. As a 
result, malware will not be able to run. Applications Launch Control can be used not only as an additional file protection tool, 
but also as a stand-alone server protection solution. 
 
 L–117 
Lab 15 
 
Lab 15. 
How to create allow rules for installation 
packages and updates 
Scenario. Application Startup Control reacts to the start of each executable file. However, if an application is supplied within a 
self-extracting archive, it is insufficient to create an allow rule for this archive only. Such a rule will allow you only to unpack 
the archive, but will not permit starting the installation. The administrator is to configure Application Startup Control to allow 
the installation as well as unpacking. 
Contents. In this lab, we will: 
1. Create a rule that allows a self-extracting Adobe Acrobat archive to start 
2. Create a rule that allows the Adobe Acrobat installation wizard to start 
3. Make sure that the rules work 
Task A: Create a rule that allows a self-extracting Adobe Acrobat archive to 
start 
In this task, we will create an allow rule to ensure that Kaspersky Security 10.1 for Windows Server permits running a self-
extracting installer of Adobe Acrobat. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and Docker machines must be powered on. 
1. Return to Kaspersky Security Center Administration Console 
2. Open the Managed devices node and switch to the Policies tab 
3. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
 
L–118 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
4. Switch to the Local activity control section 
5. In the Applications Launch Control area, click 
the Settings button 
 
6. Click the Rules list button 
 
7. Click Add | Add one rule 
 
 L–119 
Lab 15 
 
 
8. Click Set rule triggering criterion from file 
properties 
 
9. Specify the path to the file 
C:\Users\Alex.ABC\Downloads\ 
AdbeRdr950_en_US.exe 
10. In the Rule triggering criterion area, make sure 
that the Digital certificate option is selected 
11. Click OK 
 
12. Scroll the list of rules down to the bottom 
13. Make sure that the new rule has been added 
14. Click Save 
15. Click OK 
 
L–120 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
16. Wait for the policy to be enforced 
 
Switch to the Docker computer. 
 
17. Run the AdbeRdr950_en_US.exe file (it is 
located on the desktop) 
18. Make sure that the file starts, but nothing 
happens after unpacking, the installation will not 
begin 
 
 
 L–121 
Lab 15 
 
Switch to the Alex-Desktop machine. 
19. Return to Kaspersky Security Center Administration Console 
20. Open the KSWS group and switch to the Devices tab 
21. On the shortcut menu of the Docker computer, click Custom tools | KSWS 
 
22. In the Control area, next to Applications launches denied, click the figure “3” (the actual number may differ) 
 
 
L–122 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
23. Switch to the Events tab 
24. Open the latest event 
 
25. Read the event description 
26. Close all windows 
Task B: Create a rule that allows the Adobe Acrobat installation wizard to 
start 
In this task, we will add the Adobe Acrobat distribution to the trust list to ensure that Kaspersky Security 10.1 for Windows 
Server permits the installation after the archive is unpacked. 
The task is performed on Alex-Desktop. 
 
27. Open the Managed devices node and 
switch to the Policies tab 
28. Open theproperties of the Kaspersky 
Security 10.1 for Windows Server 
policy 
29. Switch to the Local activity control 
section 
30. In the Applications Launch Control 
area, click the Settings button 
 
 L–123 
Lab 15 
 
 
31. Switch to the Software Distribution 
Control tab 
32. Select the check box Automatically 
allow software distribution for 
applications and packages listed 
33. Click the button Change packages list 
34. Select Add one distribution package 
 
35. Click Browse 
36. Specify the path to the file 
C:\Users\Alex.ABC\Downloads\ 
AdbeRdr950_en_US.exe 
37. Switch Trusting criteria to Use digital 
certificate 
38. Click OK three times 
39. Wait for the policy to be enforced 
 
 
 
 
L–124 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task C: Make sure that the rule works 
In this task, you will make sure that Kaspersky Security 10.1 for Windows Server does not block installation after the archive 
is unpacked. 
The task is performed on Docker. 
 
40. Run the AdbeRdr950_en_US.exe file (it is located 
on the desktop) 
41. Make sure that the installation wizard of Adobe 
Reader 9.5.0 starts after the unpacking 
 
42. Click Next 
43. Click Install 
44. Wait for the installation of Adobe Reader 9.5.0 to 
complete successfully 
Switch to the Alex-Desktop machine. 
45. Return to Kaspersky Security Center Administration Console 
46. Open the Managed devices node and switch to the Policies tab 
47. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
 L–125 
Lab 15 
 
 
48. Switch to the Local activity control section 
49. In the Applications Launch Control area, click 
the Settings button 
 
50. Switch to the Task management tab 
51. Clear the check box Run by schedule 
52. Click OK twice 
53. Wait for the policy to be enforced 
 
 
Conclusion 
In this lab, you have learned how to configure Application Startup Control to ensure that Kaspersky Security 10.1 
for Windows Server does not block installation of applications that are supplied within self-extracting archives after 
the distribution is unpacked. 
 
L–126 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Lab 16. 
How to configure System Inspection 
components 
Scenario. New components have appeared in Kaspersky Security 10.1 for Windows Server: Log Inspection and File Integrity 
Monitor. Log Inspection analyzes Windows system logs and uses various heuristics to detect abnormal behavior in the system. 
File Integrity Monitor checks various file operations and saves the information in the logs of Kaspersky Security 10.1 for 
Windows Server. The administrator is to enable and configure the Log Inspection and File Integrity Monitor components, and 
then test how Kaspersky Security 10.1 for Windows Server reacts to various anomalies and monitors file operations. 
Contents. In this lab, we will: 
1. Configure the Log Inspection component 
2. Check how the Log Inspection component works 
3. Configure the File Integrity Monitor component 
4. Check how the File Integrity Monitor component works 
Task A: Configure the Log Inspection component 
In this task, you will enable the Log Inspection component and modify some of its settings. 
The task is performed first on Alex-Desktop, and then on Security-Center. 
The DC computer must be turned on. 
1. Return to Kaspersky Security Center Administration Console 
2. Open the Managed devices node and switch to the Policies tab 
3. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
 L–127 
Lab 16 
 
 
4. Open System Inspection 
5. In the Log Inspection area, click Settings 
 
6. Select the check box A service was installed in 
the system 
 
7. Switch to the tab Predefined rules 
8. Click Advanced settings 
 
L–128 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
9. Set the Number of logon failures to 3 
10. Click OK 
 
11. Switch to the Task management tab 
12. Select the check box Run by schedule 
13. Click OK twice 
14. Wait for the policy to be enforced 
 
 
 L–129 
Lab 16 
 
Task B: Check how the Log Inspection component works 
In this task, we will create new services in the system, try to log on to the system with an incorrect password four times, and 
check how Kaspersky Security 10.1 for Windows Server will react to our actions. 
The task is performed first on Security-Center, and then on Alex-Desktop. 
 
15. Open the C:\Temp\ folder 
16. Run the file ConsoleApplication3.exe 
 
17. Make sure that an error message has appeared 
18. Click OK 
 
19. Run the command line interface as administrator 
20. Carry out the following commands: 
cd c:\Temp\ 
PsExec.exe -i -s cmd.exe 
 
 
21. Click Agree 
22. In the window that opens, type the following command: 
sc create Goro10_1 binPath= “c:\Temp\Goro10.exe” DisplayName= “Goro10_1” start= demand 
23. Make sure that the command has completed successfully 
[SC] CreateService SUCCESS 
 
 
L–130 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
24. Enter the following command to run the service: 
sc start Goro10_1 
25. Make sure that the service has started correctly: 
sc query Goro10_1 
 
26. Start the services.msc snap-in 
 
27. Sign out of the system 
28. Try to log on to the system under the abc\Administrator account, but type an incorrect password 4 times. 
 
 L–131 
Lab 16 
 
Switch to the Alex-Desktop machine. 
29. Return to Kaspersky Security Center Administration Console 
30. Open the KSWS group and switch to the Devices tab 
31. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
32. In the Diagnostics area, next to Possible violations, click the figure “5” (the actual number may differ) 
 
 
L–132 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
33. Switch to the Events tab 
 
34. Open the lowermost event, which is related to 
the Application popup detection rule 
35. Read the event description 
 
36. Open the event New driver installed in the 
system, which was logged when PsExec.exe 
was run 
37. Read the event description 
 
38. Open the events related to the rule A service 
was installed in the system; they appeared 
when PSEXESVC and Goro10_1 services were 
created 
39. Read the events’ descriptions 
 
 L–133 
Lab 16 
 
 
40. Open the event related to the rule There are 
patterns of a possible brute-force attack in 
the system, which was logged after the 4 
unsuccessful attempts to log on to the system 
41. Read the event description 
Task C: Configure the File Integrity Monitor component 
In this task, you will enable the File Integrity Monitor component and add a monitoring area. 
The task is performed on Alex-Desktop. 
42. Return to Kaspersky Security Center Administration Console 
43. Open the Managed devices node and switch to the Policies tab 
44. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–134 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
45. Open System Inspection 
46. In the File Integrity Monitor area, click the 
Settings button 
 
47. Click Add 
 
48. Add the folder C:\Temp\* 
 
 L–135 
Lab 16 
 
 
49. Switch to the File operation markers tab 
50. Make sure that the following option is selected: 
Detect file operations basing on all 
recognizable markers 
51. Click OK 
 
52. Switch to the Task management tab 
53. Select the check box Run by schedule 
54. Click OK 
 
55. Close the lock on the File Integrity Monitor 
area 
56. Click OK 
 
L–136 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
57. Wait for the policy to be enforced 
 
Task D: Check how the File Integrity Monitor component works 
In the previous task, we have added a folder where Kaspersky Security 10.1 for WindowsServer will monitor all file 
operations. In this task, we will modify the attributes of a file, archive another file, and check how Kaspersky Security 10.1 for 
Windows Server will react to our actions. 
The task is performed first on Security-Center, and then on Alex-Desktop. 
 
58. Open the C:\Temp\ folder 
59. Open the properties of the Goro10.exe file 
 
60. Select the check box Hidden 
61. Click OK 
 
 L–137 
Lab 16 
 
 
62. On the shortcut menu of the file torbrowser-
install-7.5.3_en-US.exe, click Send to | 
Compressed (zipped) folder 
 
63. Make sure that the file has been archived 
Switch to the Alex-Desktop machine. 
64. Return to Kaspersky Security 10.1 Console 
65. Switch to the main page 
66. In the Diagnostics area, next to Possible violations, click the figure “11” (the actual number may differ) 
 
 
L–138 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
67. Switch to the Events tab 
68. Note that the information about the actions 
performed on the files is displayed in the 
events of the File Integrity Monitor task 
69. Read the events’ descriptions 
Conclusion 
This lab demonstrates how to enable and configure the Log Inspection and File Integrity Monitor components to make 
Kaspersky Security 10.1 for Windows Server detect abnormal behavior in the system and control any file operations in the 
critical areas of the server. All information about suspicious activities is saved into the log of Kaspersky Security 10.1 for 
Windows Server. 
Lab 17. 
How to configure integration with a SIEM system 
Scenario. The Splunk Enterprise SIEM solution is deployed in the network, which gathers, stores, indexes and permits 
analyzing logs by various security systems. Kaspersky Security 10.1 for Windows Server can send events into SIEM systems. 
The administrator needs to configure Kaspersky Security 10.1 for Windows Server to transfer all logged events to Splunk 
Enterprise. 
Contents. In this lab, we will: 
1. Configure Splunk Enterprise 
2. Configure sending Kaspersky Security 10.1 for Windows Server events to SIEM 
3. Make sure that events are delivered to SIEM 
Task A: Configure Splunk Enterprise 
In this task, you will configure Splunk Enterprise to enable it receive events over syslog. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and SIEM machines must be powered on. 
1. Run the Mozilla Firefox browser 
2. Open http://10.28.0.70:8000 
 
 L–139 
Lab 17 
 
3. Specify the account configured for connecting to the web console: admin and admin password 
4. Click Sign in 
 
5. Click Settings | DATA | Data inputs 
 
6. Find the TCP type and click the respective Add new link 
 
 
L–140 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
7. Specify the TCP type and port 514 
8. Click Next 
 
9. Click Select Source Type 
10. Type syslog 
11. Select syslog 
12. Click Review 
 
 
 L–141 
Lab 17 
 
13. Click Submit 
 
14. Minimize the Mozilla Firefox window 
Task B: Configure sending Kaspersky Security 10.1 for Windows Server 
events to SIEM 
In this task, you will configure notifications in Kaspersky Security 10.1 for Windows Server. 
The task is performed on Alex-Desktop. 
15. Return to Kaspersky Security Center Administration Console 
16. Open the Managed devices node and switch to the Policies tab 
17. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–142 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
18. Switch to the Logs and notifications section 
19. In the Task logs area, click Settings 
 
20. Switch to the SIEM integration tab 
21. Select the check box Send events to a remote 
syslog server via syslog protocol 
22. In the Events format area, make sure that the 
option Convert events to STRUCTURED-
DATA is selected 
23. Specify the address of Splunk server: 10.28.0.70 
and port TCP 514 
24. Click OK 
 
25. Close the lock in the Task logs area 
26. Click OK 
 
 L–143 
Lab 17 
 
27. Wait for the policy to be enforced 
 
 
Task C: Make sure that events are delivered to SIEM 
In this task, we will verify that events are delivered to SIEM. 
The task is performed on Alex-Desktop. 
28. Open the Managed devices node and switch to the Tasks tab 
29. Run the Database update – KSWS 10.1 task and wait for it to complete 
 
 
L–144 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
30. Restore the Mozilla Firefox window 
31. Go to the SPLUNK main page (click SPLUNK> in the upper-left corner of the page) 
32. Click Search & Reporting 
 
33. Click the Data Summary button 
 
34. Click the Security-Center.abc.lab link in the Host column 
 
 
 L–145 
Lab 17 
 
35. Make sure that the SIEM system has started to receive events 
 
36. Return to Kaspersky Security Center Administration Console 
37. Open the Managed devices node and switch to the Policies tab 
38. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
L–146 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
39. Switch to the Logs and notifications section 
40. In the Task logs area, click Settings 
 
41. Switch to the SIEM integration tab 
42. Change the events’ format to Convert events to 
JSON 
43. Click OK 
44. Wait for the policy to be enforced 
 
 
 L–147 
Lab 17 
 
45. Open the Managed devices node and switch to the Tasks tab 
46. Run the Software Modules Update – KSWS 10.1 task and wait for it to complete 
 
47. Restore the Mozilla Firefox window 
48. To refresh data in the Splunk Enterprise console, click the magnifying glass button on the right 
49. Wait for new events to appear 
50. Note that the event format differs from that of the previous events 
 
Conclusion 
In this lab, you have learned how to configure Splunk Enterprise to receive events over the syslog protocol. We configured 
Kaspersky Security 10.1 for Windows Server to transfer events into the SIEM system and verified that events are delivered to 
the SIEM system. Kaspersky Security 10.1 for Windows Server can send events in two formats: standard syslog and json. 
 
L–148 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Lab 18. 
How to set Traffic Security to the External Proxy 
mode 
Scenario. ABC Inc. protects its network with Kaspersky Lab solutions. In particular, Kaspersky Security 10.1 for Windows 
Server is installed on business-critical servers. The administrator manages the protection products through Kaspersky Security 
Center. Also, a Squid proxy is deployed in the network, through which workstations connect to the Internet. The administrator 
is to configure redirecting web traffic to the Traffic Security component of Kaspersky Security 10.1 for Windows Server to 
scan it for malicious objects. 
Contents. In this lab, we will: 
1. Configure the Squid proxy server 
2. Configure the Traffic Security component 
3. Test integration of Squid and Kaspersky Security 10.1 for Windows Server 
Task A: Configure the Squid proxy server 
The Squid proxy is installed in the network, which supports ICAP, over which files can be transferred for scanning to 
the antivirus server. To integrate Squid with Kaspersky Security 10 for Windows Server, you should change the proxy 
configuration file. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and Proxy machines must be powered on. 
 
1. Run the PuTTY utility (the putty.exe file 
is located on the desktop) 
2. Enter the connection address: 10.28.0.15 
3. Click Open 
 
4. Enter username root and password 
Ka5per5Ky 
 
5. Enter the following command to open the 
Squid configuration file: 
nano 
/etc/squid/squid.conf 
 
 L–149 
Lab 18 
 
6. Add the following lines at the end of the file: 
icap_enable on 
icap_send_client_ip on 
icap_service service_resp respmod_precache bypass=1icap://10.28.0.20:1345/webscan 
adaptation_access service_resp allow all 
 
7. Press CTRL+X to close the text editor 
8. Press Y to save the changes 
9. Press ENTER 
 
 
10. Enter the following command to restart 
the Squid service: 
systemctl restart squid 
Task B: Configure the Traffic Security component 
In this task, you will switch the component to the External Proxy mode. 
 
L–150 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
The task is performed on Alex-Desktop. 
11. Open the Managed devices node and switch to the Policies tab 
12. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
13. Switch to the Real-time server protection 
section 
14. In the Traffic Security area, click Settings 
 
15. Change the Task mode to External Proxy 
16. Click OK twice 
 
 L–151 
Lab 18 
 
17. Wait for the policy to be enforced 
 
Task C: Test integration of Squid and Kaspersky Security 10.1 for Windows 
Server 
In this task, we will first change browser settings on a client computer to redirect traffic to Squid proxy server. To make sure 
that Kaspersky Security 10.1 for Windows Server receives the web traffic to be scanned from Squid over ICAP, try to 
download the eicar.com test virus from the eicar.org website. 
The task is performed on Alex-Desktop. 
18. Run the Mozilla Firefox browser 
19. Open the Options | General 
 
 
L–152 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
20. Scroll to the bottom of the page 
21. In the Network Proxy area, click Settings 
 
 
22. Type 10.28.0.15 for the proxy server 
address, and specify port 3128 
23. Select the check box Use this proxy 
server for all protocols 
24. Click OK 
 
 L–153 
Lab 18 
 
25. In a web browser, go to http://www.eicar.org/85-0-Download.html 
26. Try to download the eicar.com file 
 
27. Make sure that Kaspersky Security 10.1 for Windows Server blocks this action 
 
 
L–154 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
28. Return to Kaspersky Security Center Administration Console 
29. Open the KSWS group and switch to the Devices tab 
30. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
31. In the Server protection area, next to Objects detected, click the figure “1” (the actual number may differ) 
 
 
 L–155 
Lab 19 
 
 
32. Switch to the Events tab 
33. Consult the virus detection events 
34. Click Close 
Conclusion 
In this lab, you have learned how to configure Squid to send objects for scanning to Kaspersky Security 10.1 for Windows 
Server. You switched the Traffic Security component to the External Proxy mode to enable Kaspersky Security 10.1 for 
Windows Server receive objects from third-party solutions, and made sure that an attempt to download an infected object was 
blocked and information about the detected threats is displayed in Kaspersky Security 10.1 Console. 
Lab 19. 
How to protect a NetApp Clustered Data 
ONTAP 9.3 storage 
Scenario. ABC Inc. protects its network with Kaspersky Lab solutions. In particular, Kaspersky Security 10.1 for Windows 
Server is installed on business-critical servers. The administrator manages the protection products through Kaspersky Security 
Center. A NetApp Clustered Data ONTAP 9.3 network-attached storage is deployed in the network, which is to be protected 
with Kaspersky Security 10.1 for Windows Server. 
Contents. In this lab, we will: 
1. Configure interaction of the network storage and antivirus server 
2. Test the antivirus protection 
Task A: Configure interaction of the network storage and antivirus server 
To integrate Kaspersky Security 10.1 for Windows Server with NetApp Clustered Data ONTAP 9.3, you need to configure 
both the antivirus server and the network storage. 
The task is performed first on Security-Center, and then on Alex-Desktop. 
The DC and NetApp computers must be turned on. 
 
1. Press WIN + R and type lusrmgr.msc, then 
press ENTER 
 
L–156 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
2. Add the abc\ontapavc account to the local 
administrators group 
3. Click OK 
 
4. Press WIN + R and type secpol.msc, then 
press ENTER 
5. Open the Security Settings | Local Policies | Security Options container 
6. Configure the following parameters: 
— Network access: Do not allow anonymous enumeration of SAM accounts = Disabled 
— Network access: Let Everyone permissions apply to anonymous users = Enabled 
— Network access: Restrict anonymous access to Named Pipes and Shares = Disabled 
 
 
 
 L–157 
Lab 19 
 
Switch to the Alex-Desktop machine. 
 
7. Run the PuTTY utility (the putty.exe file is 
located on the desktop) 
8. Enter the connection address: 10.28.0.63 
9. Click Open 
 
10. Click Yes 
 
11. Enter username admin, password 
Ka5per5Ky 
12. Carry out the following command to set up an authentication tunnel for the abc.lab domain to be able to use domain 
accounts for authentication on the cluster: 
domain-tunnel create –vserver SVM-ABC 
 
13. Carry out the following command to create a cluster account associated with a domain account: 
security login create –user-or-group-name abc\ontapavc –application 
ontapi -authentication-method domain –role vsadmin-readonly –vserver 
SVM-ABC 
 
 
L–158 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Switch to the Security-Center computer 
 
14. Run the ONTAP_AV_Connector-1.0.4.exe 
file (it is located on the desktop) 
15. Click Install 
 
16. Click Yes 
 
17. Click Next 
 
18. Specify the account configured for 
connecting to the network storage: 
abc\ontapavc, password—Ka5per5Ky 
19. Click Next 
 
 L–159 
Lab 19 
 
 
20. Click Install 
 
21. Wait for the installation to complete 
22. Select the Configure ONTAP 
Management LIFs check box 
23. Click Finish 
 
24. Specify the following values: 
— Management LIF = 10.28.0.80 
— Poll = 60 
— Account = abc\ontapavc 
— Password = Ka5per5Ky 
25. Click Test 
 
26. Make sure that the connection has been 
established successfully 
27. Click OK 
 
L–160 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
28. Click Update 
29. Click Save 
30. Click Quit 
Switch to the Alex-Desktop machine. 
31. Return to Kaspersky Security Center Administration Console 
32. Open the Managed devices node and switch to the Policies tab 
33. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
 L–161 
Lab 19 
 
 
34. Switch to the section Network Attached 
storage protection 
35. In the Real-Time File Protection (RPC) 
area, click Settings 
 
36. Specify the account configured for 
connecting to the network storage: 
abc\ontapavc, password—Ka5per5Ky 
 
37. Switch to the Protection scope tab 
38. Click Add 
 
39. Type the network storage address: 127.0.0.1 
40. Click OK 
 
L–162 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
41. Switch to the Task management tab 
42. Select the check box Run by schedule 
43. Make sure that Frequency is set to At 
application launch 
44. Click OK 
 
45. Close the lock on the Real-Time File 
Protection (RPC) area 
 
46. Switch to the Logs and notifications 
section 
47. In the Task logs area, click Settings 
 
 L–163 
Lab 19 
 
 
48. Change the following values in the Event 
logging area: 
— Component = RPC-Network Storage 
Protection 
— Importance level = Informational 
events 
49. Click OK twice 
50. Wait for the policy to be enforced 
 
51. Run the PuTTY utility unless already started. Use the same connection address, 10.28.0.63. Username admin, password 
Ka5per5Ky 
52. Enter the following command to create a scanner pool: 
vserver vscan scanner-pool create –vserver SVM-ABC –scanner-pool MyPool 
–hostnames 10.28.0.20 –privileged-users abc\ontapavc 
 
53.Enter the following command to apply the scanning policy to the scanner pool: 
vserver vscan scanner-pool apply-policy –vserver SVM-ABC –scanner-pool 
MyPool –scanner-policy primary 
 
 
L–164 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
54. Enter the following command to make sure that the policy has been applied: 
vserver vscan on-access-policy show 
 
55. Enter the following command to enable antivirus scanning: 
vserver vscan enable -vserver SVM-ABC 
 
56. Enter the following command to make sure that the previous command has succeeded: 
vserver vscan show 
 
Task B: Test the antivirus protection 
To make sure that Kaspersky Security 10 for Windows Server operates correctly, let’s try to copy the eicar.com and 
eicar.cure.com files to the network storage. 
The task is performed on Alex-Desktop. 
 
57. Open the folder \\svm-abc\Test 
58. Copy the files eicar.com and 
eicar_cure.com 
 
 L–165 
Lab 19 
 
59. Return to Kaspersky Security Center Administration Console 
60. Open the KSWS group and switch to the Devices tab 
61. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
62. Switch to the Network Attached Storage Protection tab 
63. In the Real-time protection area, next to Detected, click the figure “1” (the actual number may differ) 
 
 
L–166 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
64. Switch to the Events tab 
65. Consult the virus detection events 
66. Click Close 
67. Expand the Storages node and select the Backup container 
68. Consult the contents of the Backup container 
 
 
Conclusion 
In the first task of this lab, we configured interaction between Kaspersky Security 10.1 for Windows Server and NetApp 
Clustered Data ONTAP 9.3. In the second task, we verified that real-time protection works and information about 
the detected threats is displayed in the Kaspersky Security 10.1 Console. 
Lab 20. 
How to configure Anti-Cryptor for NetApp 
Scenario. A new component: Anti-Cryptor for NetApp has appeared in Kaspersky Security 10.1 for Windows Server. It 
permits protecting NetApp NAS storages not only from viruses, but also from file-encrypting ransomware. The administrator 
is to configure the Anti-Cryptor for NetApp component of Kaspersky Security 10.1 for Windows Server and make sure that it 
works. 
 
 L–167 
Lab 20 
 
Contents. In this lab, we will: 
1. Prepare NetApp Clustered Data ONTAP 9.3 
2. Configure Anti-Cryptor for NetApp 
3. Make sure that protection against encryption works correctly 
Task A: Prepare NetApp Clustered Data ONTAP 9.3 
In this lab, we will configure the FPolicy component on the network storage side, which permits third-party applications to 
monitor file operations on the network storage. 
The task is performed on Alex-Desktop. 
The DC, Security-Center, and NetApp machines must be powered on. 
 
1. Run the PuTTY utility (the putty.exe file is 
located on the desktop) 
2. Enter the connection address: 10.28.0.63 
3. Click Open 
 
4. Click Yes 
 
5. Enter username admin, password Ka5per5Ky 
6. Enter the following command to create an FPolicy external engine: 
vserver fpolicy policy external-engine create -vserver SVM-ABC -engine-name KSWS 
-primary-servers 10.28.0.20 -port 1346 -extern-engine-type synchronous -ssl-
option no-auth 
 
 
L–168 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
7. Make sure that the previous command has succeeded: 
vserver fpolicy policy external-engine show 
 
8. Enter the following command to create an FPolicy event: 
vserver fpolicy policy event create -vserver SVM-ABC -event-name cifs_event -
protocol cifs -file-operations create, open, rename, write, close, setattr, 
delete -volume-operation false -filters close-with-modification, first-write, 
write-with-size-change, open-with-delete-intent 
 
9. Make sure that the previous command has succeeded: 
vserver fpolicy policy event show 
 
10. Enter the following command to create an FPolicy policy: 
vserver fpolicy policy create -vserver SVM-ABC -policy-name kswspolicy -events 
cifs_event -engine KSWS -is-mandatory true -allow-privileged-access yes -
privileged-user-name abc\ontapavc 
 
11. Enter the following command to configure the policy scope: 
vserver fpolicy policy scope create -vserver SVM-ABC -policy-name kswspolicy -
shares-to-include * -file-extensions-to-include "" 
 
 
 L–169 
Lab 20 
 
12. Enter the following command to enable the FPolicy policy: 
vserver fpolicy enable -vserver SVM-ABC -policy-name kswspolicy -sequence-number 1 
 
Task B: Configure Anti-Cryptor for NetApp 
In this task, you will configure and enable the Anti-Cryptor for NetApp component in the policy of Kaspersky Security 10.1 
for Windows Server. 
The task is performed on Alex-Desktop. 
13. Return to Kaspersky Security Center Administration Console 
14. Open the Managed devices node and switch to the Policies tab 
15. Open the properties of the Kaspersky Security 10.1 for Windows Server policy 
 
 
16. Switch to the section Network Attached 
storage protection 
17. In the Anti-Cryptor for NetApp area, click 
Settings 
 
L–170 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
18. Make sure that the Active mode is selected 
 
19. Switch to the Addressing tab 
20. Specify the following settings in the 
Connection area: 
— IP address of protected cluster = 
10.28.0.63 
— Vserver name = SVM-ABC 
— FPolicy name = kswspolicy 
— Port = 1346 
21. Click the button List of cluster nodes 
 
22. Enter cluster-abc-01 for the cluster node 
name 
23. Click Add 
24. Click OK 
 
25. Specify the domain account configured for 
connecting to the network storage: 
abc\ontapavc, password—Ka5per5Ky 
26. Specify the account that has administrator 
permissions on the network storage: admin, 
password—Ka5per5Ky 
 
 L–171 
Lab 20 
 
 
27. Switch to the Task management tab 
28. Select the check box Run by schedule 
29. Make sure that Frequency is set to At 
application launch 
30. Click OK 
 
31. Close the lock on the Anti-Cryptor for 
NetApp area 
32. Click OK 
33. Wait for the policy to be enforced 
 
 
L–172 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
Task C: Make sure that protection against encryption works correctly 
To make sure that Kaspersky Security 10.1 for Windows Server operates correctly, let’s try to remotely encrypt files in 
the network storage. 
The task is performed on Alex-Desktop. 
 
34. Open the folder \\svm-abc\Test 
35. Copy the Docs folder (you can find it on 
the desktop) 
 
36. Open the Docs folder 
37. Select all files (CTRL+A) 
38. Right-click them and select AES Encrypt 
on the shortcut menu 
 
39. Type the password: 123 
40. Click OK 
 
41. Make sure that the following error is 
displayed at an attempt to encrypt files: 
Access is denied 
42. Click OK 
 
 L–173 
Lab 20 
 
43. Return to Kaspersky Security Center Administration Console 
44. Open the KSWS group and switch to the Devices tab 
45. On the shortcut menu of the Security-Center computer, click Custom tools | KSWS 
 
46. Switch to the Network Attached Storage Protection tab 
47. In the Anti-Cryptor protection area, next to Malicious encryption attempts detected, click the figure “1” (the actual 
number may differ) 
 
 
L–174 KASPERSKY LAB™ 
KL 005.10.1: Kaspersky Security 10.1 for Windows Server 
 
 
48. Switch to the Events tab 
49. Consult the virus detection events 
50. Click Close 
 
Conclusion 
In this lab, you have learned how to configure the Anti-Cryptor for NetApp component to enable Kaspersky Security 10.1 for 
Windows Server monitor actions performed on files and protect a NetApp Clustered Data ONTAP 9.3 NAS storage against 
file-encrypting ransomware. 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
v.1.15 
	Lab 1.How to prepare the Administration Server
	Task A: Unpack the Kaspersky Security 10.1 for Windows Server distribution on the administrator’s workstation
	Task B: Add a license for Kaspersky Security 10.1 for Windows Server
	Task C: Create a group for Kaspersky Security 10.1 for Windows Server
	Task D: Create an installation package for Kaspersky Security 10.1 for Windows Server
	Lab 2. How to install Kaspersky Security 10.1 for Windows Server
	Task A: Install Kaspersky Security 10.1 for Windows Server through Kaspersky Security Center
	Task B: Control the installation results
	Lab 3. How to install Kaspersky Security 10.1 Console
	Task A: Install Kaspersky Security 10.1 Console locally
	Task B: In Kaspersky Security Center, create a utility that will start Kaspersky Security Console and automatically connect to the selected server
	Lab 4. How to configure updates and on-demand scanning
	Task A: Complete the Managed Application Quick Start Wizard
	Task B: Create a module update task
	Task C: Create a full scan task for servers
	Lab 5. How to configure Real-Time Protection
	Task A: Configure a notification about module updates
	Task B: Enable Kaspersky Security Network
	Task C: Make sure that the KSN task is running
	Lab 6. How to test protection of Docker containers
	Task A: Configure the Real-Time File Protection task
	Task B: Test protection of Docker containers without accessing a malicious file
	Task C: Test protection of Docker containers when a malicious file is accessed
	Lab 7. How to test protection of Windows Subsystem for Linux
	Task A: Make sure that Kaspersky Security 10.1 for Windows Server can detect malicious files that run within Windows Subsystem for Linux
	Lab 8. How protection of server shared folders works
	Task A: Make sure that Kaspersky Security 10.1 for Windows Server can block remote computers
	Lab 9. How to configure the Anti-Cryptor component
	Task A: Enable the Anti-Cryptor component
	Task B: Make sure that the Anti-Cryptor task can detect encryption activities
	Lab 10. How to set Traffic Security to Driver Interceptor mode
	Task A: Enable notifications for terminal users
	Task B: Enable the Traffic Security component
	Task C: Verify that unwanted websites are blocked
	Task D: Verify that Tor networks are blocked
	Lab 11. How to configure Traffic Security to scan mail traffic
	Task A: Install Kaspersky Security 10.1 Add-in for Microsoft Outlook
	Task B: Enable mail threat protection
	Task C: Verify that Kaspersky Security 10.1 for Windows Server intercepts mail traffic
	Lab 12. How to configure Exploit Prevention
	Task A: Enable protection against exploits
	Task B: Make sure that protection against exploits works correctly
	Lab 13. How to enable Applications Launch Control in the test mode
	Task A: Create a shared folder
	Task B: Configure a rule generation task
	Task C: Run the task and import rules to the policy
	Task D: Enable Applications Launch Control in the test mode
	Lab 14. How to enable Applications Launch Control in the Default Deny mode
	Task A: Test the Statistics Only mode
	Task B: Create a selection for the test events
	Task C: Add rules based on the test events
	Task D: Switch Applications Launch Control to the Default Deny mode
	Task E: Verify that unallowed programs cannot be started
	Lab 15. How to create allow rules for installation packages and updates
	Task A: Create a rule that allows a self-extracting Adobe Acrobat archive to start
	Task B: Create a rule that allows the Adobe Acrobat installation wizard to start
	Task C: Make sure that the rule works
	Lab 16. How to configure System Inspection components
	Task A: Configure the Log Inspection component
	Task B: Check how the Log Inspection component works
	Task C: Configure the File Integrity Monitor component
	Task D: Check how the File Integrity Monitor component works
	Lab 17. How to configure integration with a SIEM system
	Task A: Configure Splunk Enterprise
	Task B: Configure sending Kaspersky Security 10.1 for Windows Server events to SIEM
	Task C: Make sure that events are delivered to SIEM
	Lab 18. How to set Traffic Security to the External Proxy mode
	Task A: Configure the Squid proxy server
	Task B: Configure the Traffic Security component
	Task C: Test integration of Squid and Kaspersky Security 10.1 for Windows Server
	Lab 19. How to protect a NetApp Clustered Data ONTAP 9.3 storage
	Task A: Configure interaction of the network storage and antivirus server
	Task B: Test the antivirus protection
	Lab 20. How to configure Anti-Cryptor for NetApp
	Task A: Prepare NetApp Clustered Data ONTAP 9.3
	Task B: Configure Anti-Cryptor for NetApp
	Task C: Make sure that protection against encryption works correctly

Mais conteúdos dessa disciplina