Special considerations when converting policies and tasks if the application is upgraded

25 March 2022

ID 83767

Policies are converted as follows depending on the protected infrastructure for which the policy is configured:

  • If the protected infrastructure was selected and protection profiles were assigned in the policy of the previous version of the application, conversion will result in the creation of a policy for one KSC cluster. The protected infrastructure for which the policy is configured and the assignment of protection profiles to objects of the virtual infrastructure are retained.
  • If a protected infrastructure was not selected in the policy of the previous version of the application, conversion will result in the creation of a policy for all KSC clusters. The main protection profile is assigned to all objects of the virtual infrastructure.

    It is recommended to change the infrastructure for whose protection this policy is used, or place this policy into the Managed devices administration group to use this policy for the protection of all virtual machines within the protected infrastructure of all KSC clusters.

The settings that were not configured in the policies and tasks of the previous version of the application take the following values in the converted policies and tasks:

  • Scan virtual machine templates (while performing a scan task) – disabled.
  • Transmit information only to indicated IP addresses (when using SNMP monitoring) – disabled, list of IP addresses is empty.
  • Action upon detecting network attack – Select action automatically.
  • Monitor virtual machine network activity – disabled.
  • Action upon detecting suspicious activity – Select action automatically.
  • Scan web addresses based on the database of phishing web addresses – disabled.

The Network paths are case sensitive parameter is missing from converted policies. When protecting virtual machines running Windows operating systems, Kaspersky Security is not case sensitive regarding the characters in the extensions of files that are to be included in the protection scope.

In converted policies, the protection profile that is generated automatically when a policy is created is called the "main protection profile" (in policies of the previous version of the application it is called the "root protection profile").

Special considerations when converting tasks:

  • Converted custom scan tasks use the task scope that was specified in tasks of the previous version of the application.
  • Converted tasks use the run schedule that was specified in tasks of the previous version of the application.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.