How to configure Web Policy Management settings in Kaspersky Small Office Security 3 for Personal Computer


Kaspersky Small Office Security 3.0 (PC)


How to configure Web Policy Management settings in Kaspersky Small Office Security 3 for Personal Computer

Back to "Web Policy Management"
Latest update: November 15, 2013 ID: 10558

Web Policy Management is a Kaspersky Small Office Security 3 for Personal Computer component that is used to configure computer access and Internet access restrictions for each user account.

To set up individual Web Policy Management settings for each user account, perform the following actions:

  1. Open Kaspersky Small Office Security 3 for Personal Computer.
  2. Click the button  to slide up the Quick Launch panel.
  3. Click the Web Policy Management button.

  1. Set up a password so that managed users could not change the settings of Web Policy Management.


  1. Specify the administrator password's scope by selecting one of the check boxes, then click the button Apply password.

  1. If you have already set up administrator password, enter it to access Web Policy Management settings, then click Log in

  1. In the Web Policy Management window, click the button Select control level opposite the user account you would like to configure.

  1. In the User control level window, select an option button next to the desired control level, then click OK:
    • Web policies are disabled
    • Data collection. 
    • Strict restrictions.
    • Weak restrictions.  
    • Custom restrictions.


To configure custom restrictions for the user account, select the option button Custom restrictions and click the Settings button.      

  1. In the Web policies window, select the check box Enable control for the user on the Settings tab. Next, you can configure Web Policy Management settings for the following activities:
    • Computer Usage. 
    • Applications Usage. 
    • Internet Usage (limitations on using Internet connections by schedule).
    • Web Browsing (limitations according to websites' content).
    • File Downloads (by content categories). 
    • Correspondence with certain contacts via:
      • Internet messengers (ICQMirandamIRC etc.).
      • Social networks (FacebookYahooTwitter).
    • Sharing of private data. 
    • Using certain words and word combinations when sending instant messages.


1. Computer Usage


2. Applications Usage


3. Internet Usage


4. Web Browsing


5. File Downloads

Was this information helpful?
Yes No
Thank you


How can we improve this article?

Your feedback will be used for content improvement purposes only. If you need assistance, please contact technical support.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.