User manual KASPERSKY ENDPOINT SECURITY 8 FOR LINUX ADMINISTRATOR GUIDE

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual KASPERSKY ENDPOINT SECURITY 8. We hope that this KASPERSKY ENDPOINT SECURITY 8 user guide will be useful to you.

Lastmanuals help download the user guide KASPERSKY ENDPOINT SECURITY 8.


Mode d'emploi KASPERSKY ENDPOINT SECURITY 8
Download

You may also download the following manuals related to this product:

   KASPERSKY ENDPOINT SECURITY 8 FOR LINUX INSTALLATION GUIDE (714 ko)

Manual abstract: user guide KASPERSKY ENDPOINT SECURITY 8FOR LINUX ADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] Kaspersky Endpoint Security 8 for Linux ADMINISTRATOR'S GUIDE APPLICATION VERSION: 8. 0 Dear User!We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability by applicable law. [. . . ] Protocol that provides remote access to the specified resources. This setting is used only when <file system type> has the Mounted or Shared value. The full path to the excluded directory. Examples: Path=Mounted:NFS ­ exclude all remote directories mounted using NFS. [ExcludedFromScanScope:AccessUser] Scanning exclusion when attempting access using the rights of specified users. Kaspersky Endpoint Security will exclude objects from scanning only if they are accessed by applications with the user and group rights specified by the settings in this section. If section settings are not specified, Kaspersky Endpoint Security excludes objects when they are accessed with any rights. The settings of this section are applied only in real-time protection tasks. They are not used for on-demand scan tasks. UserName Kaspersky Endpoint Security excludes objects only if they are accessed by applications running with the permissions of specified users. You can specify several values for this 122 KASPERSKY ENDPOINT SECURITY CONFIGURATION FILES' SETTINGS SETTING DESCRIPTION AND POSSIBLE VALUES setting, for example: UserName=usr1 UserName=usr2 Default value: not configured. UserGroup Group name. Kaspersky Endpoint Security excludes objects only if they are accessed by applications running with the permissions of specified groups. You can specify several values for this setting, for example: UserGroup=group1 UserGroup=group2 Default value: not configured. UPDATE TASKS SETTINGS This section describes the settings of the update task configuration file. You can review it to create new update tasks and modify settings in the existing tasks. To change the settings of an existing task, you need to export the task settings into a file (see page 76) open the file in any text editor, modify the settings as required, save the file, and then import the settings from the file into the task (see page 77). The structure of the INI configuration file of the update tasks Configuration file of the update tasks consists of the set of settings and sections. File sections describe the function performed by the update task, update source and settings used to connect to it. Using the UpdateType setting, select the function which will be performed by the update task. In the [UpdateComponentsSettings] section specify whether you wish to download the updates specified by the UpdateType setting or only receive information about their availability. The [CommonSettings] section defines the type of the update source and the settings used to connect to it. Using settings in this section specify whether you wish Kaspersky Endpoint Security to use the proxy server when it connects to various types of update sources and specify the proxy server settings. The [CommonSettings:CustomSources] section is required if you have selected user-defined sources as the update source. Here you should specify the address of the user-defined update source. [. . . ] Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY ENDPOINT SECURITY 8

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY ENDPOINT SECURITY 8 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag