Kaspersky Lab WorkSpace Security EU ED, 250-499u, 2Y, RNW KL4851XATDR User Manual
Product codes
KL4851XATDR
C
O N F I G U R I N G A P P L I C A T I O N S E T T I N G S
167
You can add a new port or disable monitoring for a certain port, thereby disabling analysis of the traffic passing through
that port for dangerous objects.
that port for dangerous objects.
For example, there is a nonstandard port on your computer through which data is exchanged with a remote computer
using HTTP protocol. Web Anti-Virus monitors HTTP traffic. To analyze this traffic for malicious code, you can add this
port to the list of monitored ports.
using HTTP protocol. Web Anti-Virus monitors HTTP traffic. To analyze this traffic for malicious code, you can add this
port to the list of monitored ports.
When any of its components starts, Kaspersky Anti-Virus opens port 1110 as a listening port for all incoming connections.
If that port is reserved at the time, it selects 1111, 1112, etc., as a listening port.
If that port is reserved at the time, it selects 1111, 1112, etc., as a listening port.
If you use Kaspersky Anti-
Virus and another vendor’s firewall simultaneously, you should configure that firewall to allow
the avp.exe process (internal Kaspersky Anti-Virus process) on all the ports listed above.
For example, your firewall contains a rule for iexplorer.exe that allows for establishing connections on port 80. However,
when Kaspersky Anti-Virus intercepts the connection query initiated by iexplorer.exe on port 80, it transfers it to avp.exe,
which in turn attempts to establish connection with the web page independently. If there is no allow rule for avp.exe, the
firewall will block the query. The user will then be unable to access the webpage.
when Kaspersky Anti-Virus intercepts the connection query initiated by iexplorer.exe on port 80, it transfers it to avp.exe,
which in turn attempts to establish connection with the web page independently. If there is no allow rule for avp.exe, the
firewall will block the query. The user will then be unable to access the webpage.
In order to add a port to the list of monitored ports:
1. Open the application settings window.
2. In the left part of the window, select the Network section.
3. In the Monitored ports section click the Port settings button.
4. In the Port settings window that will open, click the Add button.
5. In the Port window that will open, specify the required data.
In order to exclude a port from the list of monitored ports:
1. Open the application settings window.
2. In the left part of the window, select the Network section.
3. In the Monitored ports section click the Port settings button.
4. In the Port settings window that will open, uncheck the box next to the port's description.
S
CANNING ENCRYPTED CONNECTIONS
Connecting using the Secure Sockets Layer (SSL) protocol protects data exchange channel on the Internet. The SSL
protocol allows identifying the parties that exchange data using electronic certificates, encoding the data being
transferred, and ensuring their integrity in the course of the transfer.
protocol allows identifying the parties that exchange data using electronic certificates, encoding the data being
transferred, and ensuring their integrity in the course of the transfer.
These features of the protocol are used by hackers to spread malicious programs, since most antivirus programs do not
scan SSL traffic.
scan SSL traffic.
Kaspersky Anti-Virus verifies secure connections using Kaspersky Lab certificate. This certificate will always be used to
check whether the connection is secure.
check whether the connection is secure.
Further traffic scans via the SSL protocol will be performed using the installed Kaspersky Lab's certificate. If an invalid
certificate is detected when you connect to the server (for example, if the certificate is replaced by an intruder), a
notification will be displayed with suggestions to either accept or reject the certificate, or view the certificate information.
certificate is detected when you connect to the server (for example, if the certificate is replaced by an intruder), a
notification will be displayed with suggestions to either accept or reject the certificate, or view the certificate information.
To enable encrypted connections scan, please do the following:
1. Open the application settings window.
2. In the left part of the window, select the Network section.