Glossary

5 March 2024

ID 95897

Account on Kaspersky Business Hub

An account that you must have to configure Kaspersky Endpoint Security Cloud by, for example, adding and removing user accounts, and configuring security profiles (security policies). This account lets you use the My Kaspersky service. You create this account when you start using Kaspersky Endpoint Security Cloud.

Administration Server

Server by Kaspersky that is designed to manage security applications on devices connected to Kaspersky Endpoint Security Cloud and to store the individual settings of Kaspersky Endpoint Security Cloud for the companies that use these applications.

Anti-malware databases

Databases that contain information about computer security threats known to Kaspersky as of when the anti-malware databases are released. Entries in anti-malware databases allow malicious code to be detected in scanned objects. Anti-malware databases are created by Kaspersky specialists and updated hourly.

Apple Push Notification service (APNs) certificate

Certificate signed by Apple, which allows you to use Apple Push Notification. Through Apple Push Notification, an iOS MDM Server can manage iOS devices.

Background scan

The background scan mode of Kaspersky Endpoint Security for Windows does not display notifications for the user. This scan requires less computer resources than other types of scans (such as a full scan). In this mode, Kaspersky Endpoint Security for Windows scans startup objects, the boot sector, system memory, and the system partition.

Certificate Signing Request

File with the settings of an Administration Server, which is approved by Kaspersky and then sent to Apple to obtain an APNs certificate.

Compliance control

Verification that the settings of a mobile device and Kaspersky Endpoint Security for Android comply with corporate security requirements. Corporate security requirements regulate the device usage. For example, real-time protection must be enabled on the device, the anti-malware databases must be up-to-date, and the device password must be strong enough. Compliance control is based on a list of rules. A compliance rule includes the following components:

  • Device check criterion (for example, absence of prohibited apps on the device)
  • Time interval allocated for the user to fix the noncompliance (for example, 24 hours)
  • Action that will be taken on the device if the user does not fix the noncompliance within the time set (for example, locking the device)
Device owner

Device user whose account has been added to the list of users of Kaspersky Endpoint Security Cloud. The owner of a mobile device (Android or iOS) is determined automatically by the software. The owner of a Windows device or Mac device is manually assigned by the Kaspersky Endpoint Security Cloud administrator for the purpose of simplifying device security management.

File Threat Protection

Security application component that resides in the device RAM and scans all files that are opened, saved, or executed. By default, this component is configured with the settings that are recommended by Kaspersky experts.

Host Intrusion Prevention (Application Privilege Control)

Security application component that prevents applications from performing actions that may be harmful to the operating system, and controls access to operating system resources and to personal data.

Kaspersky Business Hub

Online resource for registering companies to use the Kaspersky software solution intended for centralized management and protection of the computers and mobile devices of employees of the registered companies.

Kaspersky Endpoint Security Cloud Management Console

The Kaspersky Endpoint Security Cloud component that provides a user interface for configuring and tracking the operation of Kaspersky Endpoint Security Cloud.

Kaspersky Security Network (KSN)

An infrastructure of cloud services that provides access to the Kaspersky database with constantly updated information about the reputation of files, web resources, and software. Kaspersky Security Network ensures faster responses by Kaspersky applications to threats, improves the performance of some protection components, and reduces the likelihood of false positives.

Mail Threat Protection

Security application component that scans incoming and outgoing email messages. The component is started when the application starts, resides in the device RAM, and scans all messages sent or received via the POP3, SMTP, IMAP, and NNTP protocols.

Malicious web addresses

Web addresses of resources that propagate malware.

Malware

A program that infects other ones, by adding its code to them in order to gain control when infected files are run. This simple definition allows identifying the main action performed by any malware: infection.

Managed device

Device with a security application installed that is connected to Kaspersky Endpoint Security Cloud.

Network Agent

A program component that enables interaction between the Administration Server and the security applications that are installed on devices connected to Kaspersky Endpoint Security Cloud. Security applications for Windows devices and for Mac devices use different versions of Network Agent.

Network Threat Protection

Security application component that scans inbound network traffic of a device for activity that is typical of a network attack, such as an intrusion of a remote device into the operating system. When it detects an attempted network attack on the device, the component blocks network activity from the attacking computer.

Patch

Software update that fixes a vulnerability.

Phishing

A type of internet fraud aimed at obtaining unauthorized access to users' confidential data.

Proxy server

A computer network service which allows users to make indirect requests to other network services. First, a user connects to a proxy server and requests a resource (e.g., a file) located on another server. Then the proxy server either connects to the specified server and obtains the resource from it or returns the resource from its own cache (if the proxy has its own cache). In some cases, a user's request or a server's response can be modified by the proxy server for certain purposes.

Quarantine

Section in the Kaspersky Endpoint Security Cloud Management Console that is named after one of the categories of files in this section. The Quarantine section displays copies of infected files that security applications deleted or modified during disinfection. The Quarantine section also displays files that could not be disinfected when they were detected, as well as files for which disinfection failed or was postponed. Files in the Quarantine section are stored in encrypted form.

The Quarantine file category refers to files that were considered to be probably infected or could not be disinfected at the time they were detected.

Security application

The Kaspersky application that protects computers, mobile devices, and data stored on them from malware. One of the following Kaspersky applications can be employed as your security application:

  • For Windows devices: Kaspersky Endpoint Security for Windows
  • For Mac devices: Kaspersky Endpoint Security for Mac
  • For Android devices: Kaspersky Endpoint Security for Android
Security profile

Named collection of settings of Kaspersky applications. This collection of settings ensures security on computers and mobile devices added to Kaspersky Endpoint Security Cloud. A single profile contains the settings of all of the supported security applications. After a security profile is applied to a device that has been added to Kaspersky Endpoint Security Cloud, the settings of the Kaspersky application on the device are replaced with those specified in the profile.

Supervised device

iOS device whose settings are monitored by Apple Configurator, a program for group configuration of iOS devices. A supervised device has the supervised status in Apple Configurator. Every time a supervised device connects to the computer, Apple Configurator checks the device configuration against the specified reference settings, and then redefines them if necessary. A supervised device cannot be synchronized with Apple Configurator installed on a different computer.

Every supervised device provides more settings to redefine through the Kaspersky Mobile Device Management policy than a non-supervised device. For example, you can configure an HTTP proxy server to monitor internet traffic on a device within the corporate network. By default, all mobile devices are non-supervised.

Trusted device

Windows device that can be fully accessed at any time by the users specified in the trusted device settings.

Trusted Platform Module (TPM)

A microchip developed to provide basic functions related to security (for example, for storing encryption keys). A TPM is usually installed on the computer motherboard and interacts with all other system components through the hardware bus.

Trusted zone

The trusted zone contains files, folders, and objects that you consider safe. Kaspersky Endpoint Security Cloud does not scan or monitor items from this zone.

Update importance level

Attribute of an update. If a third-party update or Microsoft update is a patch that fixes vulnerabilities, its importance level is determined by the most critical severity level among the vulnerabilities that the patch can fix. If an update does not fix any vulnerability, its importance level is Low.

User alias

User account name that is displayed in Kaspersky Endpoint Security Cloud Management Console.

Vulnerability

A flaw in an operating system or an application that may be exploited by malware makers to penetrate the operating system or application, and corrupt its integrity. The presence of a large number of vulnerabilities in an operating system makes it unreliable, because malware that penetrates the operating system may cause disruptions in the operating system itself and in installed applications.

Vulnerability severity level

Attribute of a vulnerability. It determines the risk associated with the vulnerability, namely, the worst theoretical outcome if the vulnerability is exploited.

There are three severity levels for vulnerabilities:

  • Critical

    A vulnerability whose exploitation could allow malicious code execution without user interaction, warnings, or prompts.

  • High

    A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of your user's data, or of the integrity or availability of processing resources.

  • Medium

    Impact of the vulnerability is increased by such factors as authentication requirements or applicability only to non-default configurations.

Web Threat Protection

Security application component that protects incoming and outgoing data that is sent to and from a device over the HTTP, HTTPS, and FTP protocols, and prevents dangerous scripts from running on the device.

Windows device name

Full name of the Windows device that is displayed in the computer properties window.

Workspace

An instance of Kaspersky Endpoint Security Cloud created for a specific company. When you create a workspace, Kaspersky creates and configures the infrastructure behind this workspace. You use Kaspersky Endpoint Security Cloud Management Console to manage your workspace and the security applications installed on the devices of the company.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.