Configuring the application

23 May 2024

ID 255931

You can configure the application through the web interface of the Control node of the cluster. The new settings are automatically propagated to Secondary nodes.

The application configuration scenario consists of the following steps:

  1. Configuring the connection to the proxy server

    Perform this step if the node does not have direct Internet access for activating the application, updating databases, and functioning of KSN/KPSN services and the Moebius service.

  2. Application activation

    Activate KSMG using an activation code or, if you do not have Internet access, add a license key using a key file.

  3. Configuring application database updates

    If you do not have Internet access, configure application database updates via an update source located in the local network.

  4. Updating databases manually

    Wait for the update task to complete. Restart the operating system to apply the database update.

  5. Configuring protection settings
  6. Configuring Backup settings
  7. Configuring participation in Kaspersky Security Network

    If you want to have access to Kaspersky Security Network reputation databases and other statistical data without sending data from your computers to Kaspersky Security Network, you can configure the use of Kaspersky Private Security Network.

  8. Configuring integration with the KATA server

    Perform this step if the KATA application is deployed in your organization.

  9. Configuring integration with an external directory service over LDAP
  10. Configuring Single Sign-On (SSO) user authentication

    This step is required if you want personal and privileged users to use domain accounts.

  11. Creating user accounts and roles

    Assign roles to users as necessary.

    If the 'helpdesk' account was used in the previous version of the application, create a role with similar permissions: viewing messages in Backup, delivering messages from Backup, managing addresses in personal allow and deny lists.

  12. Configuring the application for personal users

    Configure personal user account settings, personal Backup settings, and the personal Backup digest schedule.

  13. Migrating message processing rules and personal lists of users from the previous version of the application

    When upgrading the application from a previous version, you can export rules and personal lists of users from the old version, and then import them into the new version.

    To import settings, specify the path to the file obtained by exporting application settings from the previous version.

  14. Configuring message processing rules

    You must perform this step if data for importing rules does not exist or if you need additional rules.

  15. Configuring system log settings
  16. Configuring the export of events to an external SIEM system
  17. Configuring application monitoring using SNMP
  18. Configuring email notifications about application events
  19. Configuring the application statistics report schedule

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.