Kaspersky Lab Hosted Email & Web Security, 50-99u, 3Y KL7604XWQTS Benutzerhandbuch
Produktcode
KL7604XWQTS
C
O N T E N T S
5
IM Control Summary Reports ........................................................................................................................... 70
Viewing the reports ..................................................................................................................................... 71
IM Control Scheduled Reports ......................................................................................................................... 71
Edit an existing IM Control Scheduled Report ............................................................................................ 71
Delete an existing IM Control Scheduled Report ........................................................................................ 72
Add an IM Control Scheduled Report ......................................................................................................... 72
IM Control Forensic Audit ................................................................................................................................. 75
Allowed Traffic ............................................................................................................................................ 75
Blocked Traffic ............................................................................................................................................ 76
By Participants ............................................................................................................................................ 77
IM Management ..................................................................................................................................................... 77
Dictionaries. Configuring the Dictionaries......................................................................................................... 78
Restrictions ...................................................................................................................................................... 78
Default Restriction ...................................................................................................................................... 79
Creating a new Restriction ......................................................................................................................... 79
Editing or viewing a Restriction................................................................................................................... 79
Deleting a Restriction ................................................................................................................................. 79
Applications ................................................................................................................................................ 80
Dictionaries. Configuring the Dictionaries you would like to use for Blocks/Alerts ...................................... 81
Schedules ........................................................................................................................................................ 82
How Kaspersky Hosted Security processes Schedules ............................................................................. 82
Creating a Schedule ................................................................................................................................... 82
Editing a Schedule ...................................................................................................................................... 83
Deleting a Schedule ................................................................................................................................... 84
Policies ............................................................................................................................................................. 85
Creating a Policy ........................................................................................................................................ 85
Editing a Policy ........................................................................................................................................... 85
Deleting a Policy ......................................................................................................................................... 86
IM Control Notifications .......................................................................................................................................... 86
IM Control User Messages ............................................................................................................................... 87
IM Control Email Alerts..................................................................................................................................... 87
Email generation .................................................................................................................................................... 88
ADMINISTRATION ...................................................................................................................................................... 89
Editing your account details ................................................................................................................................... 89
Group Management ............................................................................................................................................... 89
How Kaspersky Hosted Security evaluates/prioritizes Groups ......................................................................... 90
Creating a Directory Group ......................................................................................................................... 90
Editing a Directory Group Name ................................................................................................................. 91
Creating a Custom Group ........................................................................................................................... 92
Adding or editing Usernames for a Custom Group ..................................................................................... 92
Creating a Group using IP Addresses ........................................................................................................ 93
Deleting a Group ........................................................................................................................................ 93
The Default Group ...................................................................................................................................... 93
Duplicate Users or IP Addresses ................................................................................................................ 94
Authentication Key Management ........................................................................................................................... 94
Connector and Authentication Key deployment scenarios ............................................................................... 94
Case 1: Company Authentication Key and Active Directory (most popular scenario) ................................. 94
Case 2: Group Authentication Key ............................................................................................................. 95