Вы находитесь на странице: 1из 75

KASPERSKY LAB

Kaspersky Anti-Virus 5.5 for Proxy


Server

ADMINISTRATOR'S
GUIDE
KASPERSKY ANTI-VIRUS 5.5 FOR PROXY SERVER

Administrator's Guide

© Kaspersky Lab
http://www.kaspersky.com

Revision date: June 2006


Contents
CHAPTER 1. KASPERSKY ANTI-VIRUS FOR PROXY SERVER .............................. 5
1.1. Hardware and software requirements .................................................................. 6
1.2. Licensing policy ..................................................................................................... 7
1.3. Distribution kit ........................................................................................................ 7
1.3.1. License agreement ......................................................................................... 8
1.4. Help desk for registered users .............................................................................. 8
1.5. Conventions........................................................................................................... 9

CHAPTER 2. OPERATION ALGORITHM AND TYPICAL DEPLOYMENT


SCENARIOS .............................................................................................................. 10
2.1. The algorithm of application functioning ............................................................. 10
2.2. Typical deployment scenarios............................................................................. 13
2.2.1. Installing the application to the same server with SQUID proxy ................. 13
2.2.2. Installation on a dedicated server................................................................. 14

CHAPTER 3. INSTALLING THE APPLICATION......................................................... 15


3.1. Installing the application on a server running Linux ........................................... 15
3.2. Installing the application on a server running FreeBSD..................................... 16
3.3. Installation procedure .......................................................................................... 16
3.4. Post-install setup ................................................................................................. 17
3.5. Distribution of the application files in directories................................................. 18

CHAPTER 4. USING KASPERSKY ANTI-VIRUS ....................................................... 20


4.1. Updating the anti-virus databases ...................................................................... 20
4.1.1. Automatic updating of the anti-virus databases........................................... 21
4.1.2. Manual updating of the anti-virus databases............................................... 22
4.1.3. Creating a shared directory for storing and sharing database updates...... 23
4.2. Managing license keys........................................................................................ 24
4.2.1. Viewing information about license keys....................................................... 25
4.2.2. Renewing your license ................................................................................. 26
4.2.3. Removing a license key ............................................................................... 27
4.3. Using a control script ........................................................................................... 28
4 Kaspersky Anti-Virus for Proxy Server

4.4. Ensuring anti-virus protection of HTTP traffic..................................................... 29


4.5. Configuring the anti-virus scan parameters for user groups.............................. 30

CHAPTER 5. ADDITIONAL SETTINGS OF KASPERSKY ANTI-VIRUS .................. 34


5.1. Creating groups ................................................................................................... 34
5.2. Anti-virus scan settings........................................................................................ 36
5.3. The choice of actions over scanned objects ...................................................... 36
5.4. Administrator notifications ................................................................................... 38
5.5. Operation modes................................................................................................. 40
5.6. Modes of interaction with proxy via ICAP........................................................... 41
5.7. Application statistics logging ............................................................................... 41
5.8. Application reporting parameters........................................................................ 43
5.9. Memory dump creation for detection of errors ................................................... 45
5.10. Work with Internet broadcasting stations.......................................................... 46

CHAPTER 6. UNINSTALLING THE APPLICATION ................................................... 47

APPENDIX A. APPLICATION REFERENCE............................................................... 48


A.1. kav4proxy.conf application configuration file...................................................... 48
A.2. Macros................................................................................................................. 55
A.3. kavicapserver return codes................................................................................. 56
A.4. Command line options for licensemanager ....................................................... 56
A.5. Licensemanager return codes............................................................................ 57
A.6. Keepup2date command line options.................................................................. 57
A.7. Keepup2date return codes ................................................................................. 59

APPENDIX B. KASPERSKY LAB................................................................................. 60


B.1. Other Kaspersky Lab Products .......................................................................... 61
B.2. Contact Us........................................................................................................... 69

APPENDIX C. LICENSE AGREEMENT ...................................................................... 70


CHAPTER 1. KASPERSKY ANTI-
VIRUS FOR PROXY SERVER

Kaspersky Anti-Virus 5.5 for Proxy Server (hereinafter also referred to as


Kaspersky Anti-Virus or the Application) is intended for anti-virus protection of
traffic routed via proxy servers based on Squid versions 2.5 and 3.0 with support
for the Internet Content Adaptation Protocol (ICAP) in accordance with RFC
3507.
The application allows the user to:
• Perform anti-virus scanning of objects transferred via the proxy server.
• Cure revealed infected objects and block access to an infected object if
disinfection fails.
• Use group settings to define various filtration parameters applied
depending upon the address of the user requesting an object and the
object's address (URL).
• Log activity statistics including, in addition to other data, information about
anti-virus scanning and its results, application errors and warnings.
• Notify administrators about detection of malicious software.
• Update the anti-virus databases. The application uses update servers of
Kaspersky Lab as the source of updates. It can also be configured to
update the databases from a local directory.
The anti-virus databases are employed for detection of infected objects
and their disinfection. The application uses database records to analyze
every object checking it for virus presence: its content is compared with
code typical for specific viruses.

Please keep in mind that new viruses appear every day and therefore
we recommend maintaining the anti-virus databases in an up-to-date
state. New updates are made available on Kaspersky Lab update
servers every hour.
6 Kaspersky Anti-Virus for Proxy Server

1.1. Hardware and software


requirements
In order to ensure normal functioning of Kaspersky Anti-Virus, the system must
meet the following hardware and software requirements:
Minimum hardware requirements for product operation:
®
• Intel Pentium 133 MHz processor or higher
• 64 MB RAM
• 50 MB of disk space for application setup
• 200 MB of available disk space for temporary files.
The configuration is intended to provide for servicing of at least 10 clients
sending at least 20 requests per minute with average request size of 15 Kb.
Optimal hardware requirements:
• for a proxy server servicing requests from 50 clients with average load of
900 requests per minute and daily traffic of 250 MB:
• Intel Pentium® II 300 MHz processor.
• 128 MB RAM.
• 512 MB of available disk space for temporary files.
• for a proxy server servicing requests from 250 clients with average load of
1300 requests per minute and daily traffic of 1 GB:
®
• Intel Pentium 4 processor.
• 512 MB RAM.
• 1 GB of available disk space for temporary files.
Software requirements:
• One of the following operating systems:
• RedHat Linux 9.0.
• RedHat Fedora Core 5.
• RedHat Enterprise Linux Advanced Server 4.
• SuSE Linux Enterprise Server 9.0.
• SuSE Linux Professional 10.1.
Kaspersky Anti-Virus for Proxy Server 7

• Mandriva 2006.
• Debian GNU/Linux version 3.1r2.
• FreeBSD version 4.11.
• FreeBSD version 5.4 .
• FreeBSD version 6.1.
• Squid 2.5 or 3.0 proxy server with ICAP support.
• Perl 5.0 or higher (www.perl.org).
• Glibc 2.2.x or higher (for Linux distributions).

1.2. Licensing policy


The licensing policy for Kaspersky Anti-Virus includes a system of product use
limitations based on the following criteria:
• Number of users protected by the application
• HTTP traffic processed daily (MB/day).
The licensing policy based on processed traffic takes into account the traffic
created by scanned objects only, auxiliary service traffic generated by the
application is not included into that volume.
Each type of licensing is also limited by a certain period (typically one year or two
years after the date of purchase).
You can purchase a license limited by one of the above criteria (for example, by
the daily HTTP traffic volume).

1.3. Distribution kit


You can purchase the product either from our dealers (retail box) or at one of our
online stores (for example, www.kaspersky.com – follow the E-store link).
The retail box contains:
• sealed envelope containing the installation CD with the product
• a copy of this Administrator’s Guide
• license key file bundled with the distribution package or recorded to a
special floppy disk
• License Agreement.
8 Kaspersky Anti-Virus for Proxy Server

Before you unseal the envelope containing the CD, make sure you
have carefully read the License Agreement.

If you purchase our application online, you will download it from Kaspersky Lab's
website. Your license key is either included in the installation package or will be
sent to you by email after payment.

1.3.1. License agreement


The license agreement constitutes a legal agreement between you and
Kaspersky Lab Ltd containing the terms and conditions subject to which you may
use the purchased software.

Please read the license agreement carefully!

If you do not agree with the terms of the license agreement you may return the
box with Kaspersky Anti-Virus to the distributor, where you have purchased it,
you will be refunded the amount you've paid for subscription, provided the CD
envelope remains sealed.
Opening the sealed envelope of the installation CD or installing the product to a
computer means your acceptance of all the terms and conditions of the license
agreement.

1.4. Help desk for registered users


Kaspersky Lab offers an extensive service package enabling registered
customers to boost the productivity of Kaspersky Mail Gateway.
If you purchase a subscription you will be provided with the following services for
the period of your subscription:
• new versions of this software product provided free of charge
• phone or email support on matters related to the installation,
configuration, and operation of the product you have purchased
• notifications about new software products from Kaspersky Lab, and about
new virus outbreaks. This service is provided to users who have
subscribed to the Kaspersky Lab email newsletter service.
Kaspersky Anti-Virus for Proxy Server 9

Kaspersky Lab does not give advice on the performance and use of
your operating system or other technologies.

1.5. Conventions
Various formatting conventions are used throughout the text of this document
depending on the purpose of a particular element. Table 1 below lists the
formatting conventions used.
Table 1. Conventions

Style Meaning

Bold type Menu titles, menu items, window titles,


parts of dialog boxes, etc.

Additional information, notes.


Note.

Information requiring special attention.


Attention!

In order to perform the Procedure description for user's steps


action, and possible actions.
1. Step 1.
2. …
Statement of a problem, example for
Task, example
using the software features.

Solution to a defined problem.


Solution

[key] – key purpose. Command line keys.

Text of information Text of configuration files, information


messages and the command messages and the command line.
line
CHAPTER 2. OPERATION
ALGORITHM AND TYPICAL
DEPLOYMENT SCENARIOS

This chapter contains essential information necessary for understanding of


application functionality, its configuration and integration with an existing network
structure.

2.1. The algorithm of application


functioning
Kaspersky Anti-Virus scans HTTP traffic using two modes of proxy operation:
REQMOD and RESPMOD.
In the RESPMOD mode the application checks objects requested by users via a
proxy server. In the REQMOD mode it scans objects transmitted from users
through the proxy. REQMOD is applied, for instance, for anti-virus scanning of e-
mail messages sent by users via a web-based mail server interface. Kaspersky
Anti-Virus scans message attachments transferred by users to mail servers.
The application performs anti-virus scanning of Internet traffic in the RESPMOD
mode in accordance with the following procedure (see Fig. 1):
1. User requests an object through a Squid proxy via HTTP.
2. If the requested object is available within the Squid proxy cache, it
will be returned to the user. If the object has not been found in
cache, Squid proxy accesses a remote server and downloads the
requested object from it.
3. Squid uses ICAP to transfer the retrieved object to Kaspersky Anti-
Virus for an anti-virus check.
4. Kaspersky Anti-Virus verifies correspondence of request
parameters (user IP address, URL of the requested object) to any
of its groups (please refer to section 5.1 on p. 34 for details about
groups). If it finds such group, then the application scans and
processes the object as necessary in accordance with the rules
specified for that group. If a request does not match any of the
Operation algorithm and typical deployment scenarios 11

existing groups, the application will use the default group rules for
anti-virus scanning and processing.
5. The application uses the results of anti-virus scanning to assign to
a scanned object a specific status, which is employed to grant
users access to that object or block access attempts (please refer
to section 5.3 on p. 36 for details about available statuses and
actions performed by the application). Access to objects with a
specific status is granted or blocked according to the processing
group parameters (please refer to section 5.1 on p. 34 for details
about groups).
6. If access to an object has been granted, Kaspersky Anti-Virus
allows Squid proxy to cache the object and transmit it to users. If
access to an object is blocked, Kaspersky Anti-Virus prohibits
Squid proxy to cache the object and deliver it to users. Instead of
the requested object, the user will receive a notification informing
that access to that object has been blocked.

Figure 1. Anti-virus scanning of traffic in the RESPMOD mode


12 Kaspersky Anti-Virus for Proxy Server

The application performs anti-virus scanning of Internet traffic in the REQMOD


mode in accordance with the following procedure (see Fig. 2):
1. User sends an object using HTTP via Squid proxy.
2. Squid proxy uses ICAP to transfer the received object to Kaspersky
Anti-Virus for an anti-virus scan.
3. Kaspersky Anti-Virus checks if the request parameters match any of the
existing groups (please refer to section 5.1 on p. 34 for details about
groups). If it finds such group, then the application scans and processes
the object as necessary in accordance with the rules specified for that
group. If a request does not match any of the existing groups, the
application will use the default group rules for anti-virus scanning and
processing.

Figure 2. Anti-virus scanning of traffic in the REQMOD mode

4. The application uses the results of anti-virus scanning to assign to a


scanned object a specific status, which is employed as a criterion to
allow transfer of that object or prohibit it (please refer to section 5.3 on
p. 36 for details about available statuses and actions performed by the
application). Permission or denial of transfer for objects with a specific
Operation algorithm and typical deployment scenarios 13

status defined according to the processing group parameters (please


refer to section 5.1 on p. 34 for details about groups).
5. If transfer is allowed, the proxy will transmit the object sent by the user.
If transfer is prohibited, Squid will not transmit the object. Instead, it will
send to the user a notification informing that the transfer has been
blocked.

2.2. Typical deployment scenarios


This section contains a description of two main methods available for application
deployment:
• Application setup on the same server with Squid proxy
• Application setup on a dedicated server.
General guidelines described in the examples will allow you to configure the
application in accordance with your existing network structure.

2.2.1. Installing the application to the same


server with SQUID proxy

Further in this document we shall use this variant of Kaspersky Anti-


Virus setup (on the same server with SQUID proxy) to describe its
operation and configuration.
Application setup on the same server with Squid allows higher speed of
processing as data transfers between Squid and Kaspersky Anti-Virus occur
locally and do not involve the network. Such deployment scheme is efficient in
case of low load on the proxy server. If the proxy is used to serve a large number
of user requests, you are advised to install the application to a dedicated server
since anti-virus scanning and processing are most resource-intensive
procedures, which can therefore influence negatively the general proxy
performance. Please refer to section 2.2.2 on p. 14 for application setup on a
dedicated server. During application setup the installer automatically configures
the following aspects:
1. Kaspersky Anti-Virus will be set up to run automatically at the operating
system start and listen for requests from Squid proxy using port 1344 for
all network interfaces of the server.
2. The following lines will be added to the ICAP OPTIONS section in the
Squid configuration file specified during application setup:
14 Kaspersky Anti-Virus for Proxy Server

icap_enable on
icap_send_client_ip on
icap_service is_kav_resp respmod_precache 0
icap://localhost:1344/av/respmod
icap_service is_kav_req reqmod_precache 0
icap://localhost:1344/av/reqmod
icap_class ic_kav is_kav_req is_kav_resp
icap_access ic_kav allow all
They will make the proxy transmit all requested objects to Kaspersky Anti-
Virus via port 1344 of the local interface.

2.2.2. Installation on a dedicated server


Installing the application to a dedicated server is recommended in case of high
load on the proxy server and in situations when Kaspersky Anti-Virus is used to
process the traffic of several proxy servers.
Since such deployment scheme does not allow automatic configuring of the
application, you should set it up manually in accordance with the following
procedure:
1. After application setup use the ListenAddress parameter in the
[icapserver.network] section of the kav4proxy.conf configuration file to
specify the IP address of the network interface and port that Kaspersky
Anti-Virus will use to wait for proxy requests to process necessary
objects. By default Kaspersky Anti-Virus waits for requests to all network
interfaces of the server on port 1344.
2. Add the following lines to the ICAP OPTIONS section of the Squid proxy
configuration file
icap_enable on
icap_send_client_ip on
icap_service is_kav_resp respmod_precache 0
icap://<ip_address>:<port>/av/respmod
icap_service is_kav_req reqmod_precache 0
icap://<ip_address>:<port>/av/reqmod
icap_class ic_kav is_kav_req is_kav_resp
icap_access ic_kav allow all
where <ip_address> stands for the IP address of the server where
Kaspersky Anti-Virus is installed; <port> is the port that Kaspersky Anti-
Virus uses to wait for proxy requests for anti-virus processing. Restart
Squid as soon as the changes are entered.
CHAPTER 3. INSTALLING THE
APPLICATION

Before installing Kaspersky Anti-Virus, you are advised to:


1. Make sure that your system meets the hardware and software
requirements (see section 1.1 on p. 6).
2. Log on to the system as root.
3. Make sure that your installed Squid proxy server supports ICAP.

Unlike Squid 3.0, Squid 2.5 does not support ICAP by default.
Please see the README-SQUID.txt file in the
/opt/kav/5.5/kav4proxy/share/doc/ directory for information
about available Squid distributions, correct compilation and
proxy configuration for ICAP support.

3.1. Installing the application on a


server running Linux
Kaspersky Anti-Virus for servers running the Linux operating system is
distributed in two different installation packages:
• .rpm – for systems that support RPM Package Manager.
• .deb – for Debian distributions.

To initiate installation of Kaspersky Anti-Virus from the rpm package,


enter the following in the command line:

# rpm –i kav4proxy-linux-<version_number>.i386.rpm

To initiate installation of Kaspersky Anti-Virus from the deb package,


enter the following in the command line:

# dpkg –I kav4proxy-linux-<version_number>.deb
During the setup process you will have to specify additional information
necessary for connection to the Internet, downloading of the anti-virus databases
16 Kaspersky Anti-Virus for Proxy Server

and the settings for interaction with the proxy server. Please refer to section 3.4
on p. 17 for details.

3.2. Installing the application on a


server running FreeBSD
The distribution file for installation of Kaspersky Anti-Virus on servers running the
FreeBSD operating system is supplied as a .tgz package.

To initiate installation of Kaspersky Anti-Virus from a tgz-package enter


the following in the command line (depending on the version of
FreeBSD distributive):
# pkg_add kav4proxy-freebsd4-<distributive version >.tgz
or
# pkg_add kav4proxy-freebsd5-< distributive version >.tgz
or
# pkg_add kav4proxy-freebsd6-< distributive version >.tgz
During the setup process you will have to specify additional information
necessary for connection to the Internet, downloading of the anti-virus databases
and the settings for interaction with the proxy server. Please refer to section 3.4
on p. 17 for details.

3.3. Installation procedure

Algorithms described in this section and in section 3.4 suggest that the
target server already has Squid 2.5 or 3.0 with ICAP support installed.

Kaspersky Anti-Virus must be installed in two stages. The first stage will be
performed automatically after execution of the commands described in sections
3.1, 3.2, it comprises the following steps:
1. Creation of the klusers group and the kluser account with the
necessary privileges that Kaspersky Anti-Virus will use to start and
operate.
2. Copying of the files from distribution package to computer.
3. Registration of services necessary for Kaspersky Anti-Virus functioning.
Installing the application 17

3.4. Post-install setup


Post-install setup of Kaspersky Anti-Virus is the second stage of its installation
including configuration of the application and Squid proxy server. To initiate the
configuration process, use the postinstall.pl script located in the
/opt/kav/5.5/kav4proxy/setup/ directory. After script start you will be offered to
perform the following actions:

The postinstall.pl script should be launched manually for RPM-based


systems. In other systems (for example, such as FreeBSD) the script
will run automatically during the installation procedure.
1. Specify the path to the license key file.
2. Configure the parameters of the proxy server used for connection to the
Internet in the following format:
http://<proxy server IP address>:<port>
or
http://<user_name>:<password>@<proxy server IP
address>:<port>
depending upon the necessity to authenticate users logging on to that
proxy. The value will be used by the application updater component
(keepup2date) for connection to Kaspersky Lab's servers and
downloading of updates to the anti-virus databases.
If you are not using a proxy for Internet connection, specify no as the
value for that parameter.
3. Download updates to the anti-virus databases from update servers of
Kaspersky Lab. Specify yes or no depending upon your wish to update
immediately or later.
4. Specify full path to the configuration file of the Squid proxy transferring
the HTTP traffic, which Kaspersky Anti-Virus is supposed to scan. The
settings necessary to enable interaction via ICAP between the proxy and
the application will be added to the configuration file.
During the process of post-install configuration the task for hourly updates of the
anti-virus databases will be registered with the cron service.
If you have not installed a license key during post-install product configuration,
then after launch Kaspersky Anti-Virus will start functioning in the unlicensed
mode. If you have not downloaded the anti-virus databases during post-install
configuration, then after launch Kaspersky Anti-Virus will start functioning
18 Kaspersky Anti-Virus for Proxy Server

without the anti-virus databases. Please see section 5.5 on p. 40 for details on
the application modes.

3.5. Distribution of the application


files in directories
After the installation of Kaspersky Anti-Virus on a server running Linux is
complete, the application files will be located in the following directories, provided
that the default paths have been accepted during the installation:
/etc/kav/5.5/kav4proxy/kav4proxy.conf – configuration file containing
application parameters.
/opt/kav/5.5/kav4proxy/bin – directory containing executable files of the
application components:
avbasestest – utility validating downloaded updates to the anti-virus
databases used by the keepup2date component.
kavicapserver – executable file of the main application component.
keepup2date – utility updating the anti-virus databases.
licensemanager – utility for management of license keys.
/opt/kav/5.5/kav4proxy/init.d/kav4proxy – service script for application
control.
/opt/kav/5.5/kav4proxy/contrib/kavproxy.wbm – Webmin plug-in module for
Kaspersky Anti-Virus management.
/opt/kav/5.5/kav4proxy/man – directory containing application manual pages.
/opt/kav/5.5/kav4proxy/share/doc/kav4proxy.groups.conf.sample – sample
file containing group-based application configuration.
/opt/kav/5.5/kav4proxy/share/doc/README-SQUID.txt – file containing
information about available Squid distributions, correct compilation and
proxy configuration for ICAP support.
/opt/kav/5.5/kav4proxy/setup – directory containing scripts used for post-
install setup and removal of the application:
keepup2date.sh – script that configures the keepup2date component.
icap_squid_setup.pl – script that configures Squid for work with
Kaspersky Anti-Virus.
postinstall.pl – post-install application setup script.
Installing the application 19

uninstall.pl – application removal script.


/var/db/kav/5.5/kav4proxy/ – application directory including:
backup/ – directory where the updater saves backup copies of the anti-
virus databases and application modules prior to an update.
bases/ – directory containing the anti-virus databases and core
modules.
licenses/appinfo.dat – file that contains information about the current
license.
patches/ – directory where the updates for the anti-virus core modules
are stored.
/var/log/kav/5.5/kav4proxy/ – directory containing the application log files.
CHAPTER 4. USING KASPERSKY
ANTI-VIRUS

This chapter contains solutions for typical tasks related to work with Kaspersky
Anti-Virus, such as application updating, management of license keys, anti-virus
protection of HTTP traffic, and configuration of different anti-virus scanning
parameters for various user groups. The tasks described in this section reflect
basic features of Kaspersky Anti-Virus. Their implementation in a specific
configuration will depend upon the organizational peculiarities of your network
and the existing security policy. Please refer to Chapter 5 on p. 34 for a detailed
explanation of application settings used in description of these tasks.

4.1. Updating the anti-virus


databases
Kaspersky Anti-Virus uses the anti-virus databases while processing the objects
requested by users through Squid proxy.
The anti-virus databases are employed during scanning and disinfection of
infected objects; they contain descriptions of all currently known viruses and the
methods of disinfection for objects affected by those viruses.
The keepup2date component is included into the application to provide for
software updates. The updates are retrieved from the update servers of
Kaspersky Lab, e.g.:
http://downloads1.kaspersky-labs.com/
http://downloads2.kaspersky-labs.com/
ftp://downloads1.kaspersky-labs.com/ etc.
The updcfg.xml file included in the installation package lists the URLs of all
available update servers.

The keepup2date component supports Basic authentication for


connections through a proxy server.

To update the anti-virus databases, the keepup2date component selects an


address from the list of update servers and tries to download updates from that
server. If the server is currently unavailable, the application connects to another
server, trying to download updates.
Using Kaspersky Anti-Virus 21

We strongly recommend that you set up the keepup2date component to


update the databases every hour!

After a successful update, a command specified as the value of the


PostUpdateCmd parameter in the [updater.options] section of the
configuration file will be executed. By default, this command will automatically
initiate reloading of the anti-virus databases. Incorrect modification of that
parameter may prevent the application from using the updated databases or
cause it to function erroneously.

All settings of the keepup2date component are stored in the [updater.*]


sections of the configuration file.

If your network has a complicated structure, we recommend that you download


updates from Kaspersky Lab’s update servers every hour and place them in a
network directory. To keep other networked computers constantly updated,
configure the local computers to copy the updates from that directory. For
detailed instructions on creation of a public directory, see section 4.1.3 on p. 23.
The updating process can be scheduled to run automatically using the cron
utility (see section 4.1.1 on p. 21) or started manually from the command line
(see section 4.1.2 on p. 22). Starting the keepup2date component requires root
or kluser user privileges.

4.1.1. Automatic updating of the anti-virus


databases
You can schedule regular automatic updates for the anti-virus databases using
the cron service. You can configure cron either manually or using the
keepup2date.sh script located in the /opt/kav/5.5/kav4proxy/setup/ directory.
In order to create a сron task updating the anti-virus databases every hour, enter
the following in the command line:
# /opt/kav/5.5/kav4proxy/setup/keepup2date.sh –install
To delete the cron task for hourly updating of the anti-virus databases, enter the
following in the command line:
# /opt/kav/5.5/kav4proxy/setup/keepup2date.sh –uninstall
22 Kaspersky Anti-Virus for Proxy Server

Task: Configure the application to update automatically your anti-virus


databases every hour. An update server should be selected from the
updcfg.xml file by default. Only errors occurring in the component
operation should be recorded in the system log. Keep a general log of
all task starts. Output no information to the console.
Solution: to perform the above task, do the following:

1. In the application configuration file, specify the following values for


the parameters below:
[updater.report]
Append=true
ReportLevel=1
2. Edit the file that sets the rules for the cron process (crontab –e) by
entering the following string for the root or kluser user, add, for
example, the following line:
In Linux:
23 * * * * /opt/kav/5.5/kav4proxy/bin/keepup2date
-q
In FreeBSD:
23 * * * * /usr/local/share/kav/5.5/
kav4proxy/bin/keepup2date -q
The specified time setting for the cron task start is just an example. You
are advised to specify your own settings for the start time to avoid
overloading the updating servers.

4.1.2. Manual updating of the anti-virus


databases
You can start updating your anti-virus databases from the command line at any
time.

Task: start updating of the anti-virus databases, save updating results in


the updatesreport.log file within the /var/log/kav/5.5/kav4proxy/
directory.
Solution: to accomplish the task, log in as the root (or any other
privileged user) and enter in the command line:
Using Kaspersky Anti-Virus 23

# keepup2date –l
/var/log/kav/5.5/kav4proxy/updatesreport.log
If you need to update the anti-virus databases on several servers, it may be more
convenient to download the updates from an update server once, save them to a
shared directory, and mount the directory within the file system of every server
running Kaspersky Anti-Virus. Then it will be sufficient to launch the update script
having specified first the mounted directory as the source of updates. FTP and
HTTP can also be used for sharing of the anti-virus databases. Please see
section 4.1.3 on p. 23 for details related to creation of a shared directory for
updates.

Task: initiate updating of the anti-virus databases using the local


/home/kluser/bases directory as the source. Output the results to the
/tmp/updatesreport.log file.
Solution: to accomplish the task, log in as the root (or any other
privileged user) and perform the following steps:

1. Mount the shared directory containing updates to the anti-virus


databases, to the local /home/kluser/bases directory.
2. Enter the following in the command line:
# keepup2date –l /tmp/updatesreport.log –g
/home/kluser/bases

You can also update the application remotely using the appropriate
Webmin plug-in.

4.1.3. Creating a shared directory for


storing and sharing database updates
To update the anti-virus databases correctly on local computers from the shared
directory, you need to reproduce in that directory a file system structure that is
similar to that of Kaspersky Lab’s update servers. This task deserves a detailed
explanation.

Task: create a shared local directory, which the local computers will use
as the source to update their anti-virus databases.

Solution: to accomplish the task, log in as the root (or any other
privileged user) and do the following:
24 Kaspersky Anti-Virus for Proxy Server

1. Create a local directory. The kluser account must have sufficient


privileges to write to it.
2. Run the keepup2date component as follows:
# keepup2date –u <dir>
where <dir> stands for a full path to the created directory.
3. Provide reading access to that directory for local computers on your
network.

4.2. Managing license keys


The right to use Kaspersky Anti-Virus is determined by the license key. The key
is included in the product’s distribution kit and entitles you to use the application
from the day you have purchased it and installed the key.

The application checks the presence of an installed license key every


time it starts or reloads its anti-virus databases.

If a license key is not installed or an error has occurred while loading the
information about the current license, the application switches into a special
unlicensed mode of operation. In that mode it does not perform anti-virus
scanning of objects transferred through a proxy server; all objects are treated
using the action specified by the LicenseErrorAction parameter (see section
A.1 on p. 48).
After the license expires, the functionality of the application will still be preserved
except for the possibility to update the anti-virus databases. You will still be able
to perform anti-virus scanning and processing of objects, but you will be unable
to use the databases issued after your license expiration date. Therefore, you
may not be protected against new viruses that have appeared after your license
expired.
In order to protect your computer against new viruses, we recommend that you
renew the license to use Kaspersky Anti-Virus.
The license key entitles you to use the application. It contains all information
related to the license you have purchased, including the type of license, license
expiry date, information about dealers, etc.
In addition to the right to use the application during the license period, you will
have the following benefits:
• twenty-four-hour technical support
• hourly updates of the anti-virus databases
Using Kaspersky Anti-Virus 25

• timely notifications about new virus threats.


Therefore it is essential to extend in time your license to use Kaspersky Anti-
Virus. You can also install an additional key. The application will start using it as
soon as the current active key expires (see section 4.2.2 on p. 26).

4.2.1. Viewing information about license


keys
You can view information about the installed license keys in the reports of the
kavicapserver component. Each time the component starts, kavicapserver loads
the license key information and displays it in the report. The kavicapserver.log
report file is stored in the /var/log/kav/5.5/kav4proxy/ directory.
More detailed information about the status of the license keys may be obtained
using licensemanager, a special component of the application.
All information about keys may be viewed either on the server’s console, or
remotely from any networked computer that has access to the Webmin module.

To view information about all installed license keys, enter the following
in the command line:
# licensemanager –s
In the server console, you will see information similar to the following:
Kaspersky license manager for Linux. Version
5.5.0/RELEASE
Copyright (C) Kaspersky Lab, 1997-2006.
Portions Copyright (C) Lan Crypto

License info:
Product name: Kaspersky Anti-Virus for Proxy Server
Expiration date: 14-06-2006, expires in 117 days

Active key info:


Product name: Kaspersky Anti-Virus for Proxy Server
Key file 0009A3A3.key
Type: Commercial
Expiration date: 14-06-2006
Serial: 0007-00047E-0009A3A
26 Kaspersky Anti-Virus for Proxy Server

To view information about a license key, enter, for example, the


following in the command line:
# licensemanager -k 00053E3D.key
where 00053E3D.key is the name of the license key file.
In the server console, you will see information similar to the following:
Kaspersky license manager. Version 5.5.0/RELEASE
Copyright (C) Kaspersky Lab, 1997-2006.
Portions Copyright (C) Lan Crypto
Product name: Kaspersky Anti-Virus for Proxy Server
Creation date: 15-03-2005
Expiration date: 14-06-2006
Serial 0007-00047E-0009A3A
Type: Commercial
Count: 1
Lifespan: 365

4.2.2. Renewing your license


Renewal of the license to use Kaspersky Anti-Virus will give you the right to re-
enable full product functionality. Besides, additional services listed in section 4.2
on p. 24 will be resumed.
The license term depends on the product you bought and the type of the license
you purchased.

To renew the license for Kaspersky Anti-Virus:

Contact the company that sold you the product and renew your license
for Kaspersky Anti-Virus.
or:
Purchase a license extension directly from Kaspersky Lab. Write a letter
of request to the Sales Department of our company at
sales@kaspersky.com or fill in the corresponding form on our website
(www.kaspersky.com), section E-Store Æ Renew Your License. After
your payment is received, we will send a license key to the email
address indicated in the corresponding field of your license renewal
form.
Using Kaspersky Anti-Virus 27

To install a new license key, enter, for example, the following in the
command line:

# licensemanager -a 00053E3D.key
where 00053E3D.key is the name of the license key file.
If the installation is successful, the following (or similar) information will
be displayed on the server console:
Kaspersky license manager. Version 5.5.0/RELEASE
Copyright (C) Kaspersky Lab. 1998-2006.
Key file 00053E3D.key is successfully registered
We recommend that you update the anti-virus databases after the installation.
If you want to install a new license key before the current license key expires,
you can add it as a backup license key. The backup key will be activated
immediately after the current one expires. The term of validity for the additional
key starts from the activation date. You can install only one backup key.
If you have installed two keys (the current and an additional one), you can view
information about the installed active and backup keys in the server console.

4.2.3. Removing a license key

To remove the current license key, enter the following in the command
line:
# licensemanager –da
If the component removes the license key successfully, the following (or similar)
information will be displayed on the server console:
Kaspersky license manager. Version 5.5.0/RELEASE
Copyright (C) Kaspersky Lab. 1998-2006.
Active key was successfully removed

To remove a backup key, enter the following in the command line:

# licensemanager –dr
The server console will display the following (or similar) information:
Kaspersky license manager. Version 5.5.0/RELEASE
28 Kaspersky Anti-Virus for Proxy Server

Copyright (C) Kaspersky Lab. 1998-2006.


Additional key was successfully removed

4.3. Using a control script


The kav4proxy application control script located in the
/opt/kav/5.5/kav4proxy/init.d directory is used to start, stop and restart the
application. It uses the following command line keys:
• start – command to check the configuration file and launch the
application. 0 return code indicates a successful start.
• stop – command to check whether Kaspersky Anti-Virus is running (using
process ID). If the application is running, the script sends the SIGTERM
signal. If the application does not stop within three seconds, the script
sends the SIGKILL signal. 0 return code indicates a successful execution.
• restart – command to stop and start the application as provided for suing
the stop and start keys.
• reload – command to reload the application configuration and the anti-
virus databases using the SIGHUP signal.
• reload_avbase – command to reload the anti-virus databases only and
validate the license key.
• stats – command to write the results of statistics counters to a file (see
section 5.7 on p. 41) and switch to report logging to another file. Launch
of the control script with the stats command line option can be used in the
systems of automatic rotation of log files in order to initiate logging into a
new file.
Using Kaspersky Anti-Virus 29

4.4. Ensuring anti-virus protection of


HTTP traffic
Task:
Provision for anti-virus scanning of HTTP traffic transmitted by Squid
installed on the same server with Kaspersky Anti-Virus in accordance
with the following requirements:
• General parameters of anti-virus scanning must be used for all
requests:
• Disinfection of infected objects must be enabled.
• Scanning of e-mail databases must be disabled.
• Scanning of packed and archived objects must be
enabled.
• Block access to infected, suspicious, damaged objects and
objects containing code that resembles a known virus.
• Use partial mode while processing proxy server requests.
• Disable anti-virus scanning of objects requested from the
www.trusted_company.com web server.
• Store statistics on the results of anti-virus scanning in the
/var/log/kav/5.5/statistic file.

Solution: to accomplish the task, perform the following steps:

1. Install Kaspersky Anti-Virus to the same server with Squid proxy


(see section 2.2.1 on p. 13) ad perform its post-install setup (see
section 3.4 on p. 17).
2. Specify the following parameter values in the kav4proxy.conf
configuration file (leave the values of parameters not mentioned in
the example unchanged):

[icapserver.filter]
ExcludeURL=www.trusted_company.com/.*

[icapserver.engine.options]
30 Kaspersky Anti-Virus for Proxy Server

ScanPacked=yes
ScanArchives=yes
ScanMailBases=no
ScanMailPlain=no
Cure=yes

[icapserver.actions]
InfectedAction=deny
SuspiciousAction=deny
WarningAction=deny
ErrorAction=skip
ProtectedAction=skip
CorruptedAction=skip

[icapserver.protocol]
AnswerMode=partial

[icapserver.statistics]
AVStatisticsFile=/var/log/kav/5.5/statistic

3. Restart Kaspersky Anti-Virus using the following command:


# /opt/kav/5.5/kav4proxy/init.d/kav4proxy reload
Please refer to Chapter 5 on p. 34 for a more detailed description of the
settings used in the solution for the task.

4.5. Configuring the anti-virus scan


parameters for user groups
The example in section 4.4 suggests that common settings are used for anti-
virus processing of all user requests coming through a proxy server. Kaspersky
Anti-Virus allows using groups for configuration of different parameters of anti-
virus protection for individual users.
Using Kaspersky Anti-Virus 31

Task:
Configure the application to perform anti-virus checks of HTTP traffic I
accordance with the following requirements:
• The following anti-virus scanning parameters must be specified
for the managers group that includes computers using the IP
addresses of the 192.168.1.0/255.255.255.0 subnet:
• Scanning of packed, archived files and e-mail
databases must be disabled.
• Disinfection of infected objects must be enabled.
• Access should be granted to clean and disinfected
objects only.
• The following anti-virus scanning parameters must be specified
for the sales group that includes computers using the IP
addresses of the 192.168.2.0/255.255.255.0 subnet:
• Scan all objects.
• Disinfection of infected objects must be enabled.
• Block access to infected, suspicious, damaged objects
and objects containing code that resembles a known
virus.
• The following anti-virus scanning parameters must be specified
for all other users:
• Scanning of e-mail databases must be disabled.
• Disinfection of infected objects must be disabled.
• Access should only be granted to objects that have
been assigned the OK status after a scan (please refer
to section 5.3 on p. 36 for details about statuses).

Solution: to accomplish the task, perform the following steps:

1. In the kav4proxy.conf configuration file, create the following


sections containing the anti-virus scanning parameters for the
managers group:

[icapserver.groups:managers]
Priority=1
32 Kaspersky Anti-Virus for Proxy Server

ClientIP=192.168.1.0/255.255.255.0
URL=.*
[icapserver.engine.options:managers]
ScanPacked=no
ScanArchives=no
ScanMailBases=no
ScanMailPlain=no
Cure=yes

[icapserver.actions:managers]
InfectedAction=deny
SuspiciousAction=deny
WarningAction=deny
ErrorAction=deny
ProtectedAction=deny
CorruptedAction=deny

2. In the kav4proxy.conf configuration file, create the following


sections containing the anti-virus scanning parameters for the
sales group:

[icapserver.groups:managers]
Priority=2
ClientIP=192.168.2.0/255.255.255.0
URL=.*
[icapserver.engine.options:managers]
ScanPacked=yes
ScanArchives=yes
ScanMailBases=yes
ScanMailPlain=yes
Cure=yes

[icapserver.actions:managers]
InfectedAction=deny
SuspiciousAction=deny
WarningAction=deny
Using Kaspersky Anti-Virus 33

ErrorAction=skip
ProtectedAction=skip
CorruptedAction=deny

3. Specify the following parameters for the default group:

[icapserver.engine.options]
ScanPacked=yes
ScanArchives=yes
ScanMailBases=no
ScanMailPlain=no
Cure=no

[icapserver.actions]
InfectedAction=deny
SuspiciousAction=deny
WarningAction=deny
ErrorAction=deny
ProtectedAction=deny
CorruptedAction=deny

4. Restart Kaspersky Anti-Virus using the following command:


# /opt/kav/5.5/kav4proxy/init.d/kav4proxy reload
Please refer to Chapter 5 on p. 34 for a more detailed description of the
settings used in the solution for the task.
CHAPTER 5. ADDITIONAL
SETTINGS OF KASPERSKY
ANTI-VIRUS

This section contains a detailed explanation of basic parameters of Kaspersky


Anti-Virus. Unlike the required settings essential for application functioning and
specified during product installation and post-install setup, additional
configuration can be performed at the administrator's discretion. It is aimed to
extend the functionality of the application and its customization to your corporate
security policy.

5.1. Creating groups


The use of groups allows an administrator to define various parameters for anti-
virus processing of objects for different user groups being requested or
transferred through a proxy server. A request is associated with a specific group
according to the IP address of the client computer requesting an object through a
proxy server and the URL of that object.

Ensure that the icap_send_client_ip parameter in Squid configuration


file is set to on. The value means that Squid will transfer the client's IP
address to Kaspersky Anti-Virus.
If request parameters do not match any of the existing groups, the application will
process requested objects in accordance with the rules specified for the default
group.
Parameters of each group are stored in the following five sections of the
application configuration file:
• [icapserver.groups:<group name>] contains the parameters that define
the group applicability range (IP addresses of clients, object URLs) and
group priority.
• [icapserver.filter:<group name>] contains filtration rules for the <group
name> group.
• [icapserver.engine.options:<group name>] contains the parameters of
anti-virus scanning used to process the objects associated with that
group.
Additional settings of Kaspersky Anti-Virus 35

• [icapserver.actions:<group name>] contains the parameters that define


actions performed by the application over objects depending upon the
status assigned to them during an anti-virus check.
• [icapserver.notify:<group name>] contains the parameters used to
notify administrators about blocked objects that the application has
applied the deny action to.
The default group parameters are specified in the [icapserver.groups],
[icapserver.filter], [icapserver.options], [icapserver.actions] and
[icapserver.notify] sections.

You do not have to specify all group parameters while creating a new one. If
some parameters are missing, the application uses its default settings
(see Appendix A.1 on p. 48).

Example: create the managers group to define the rules for processing
of objects requested by client computers using the
192.168.10.0/255.255.255.0 subnet. Prohibit for the group access to all
objects other than clean, disinfected and password-protected. Set the
group priority to 2. Use default values for all other parameters.
Solution: to accomplish the task, log in as the root (or any other
privileged user) and create the following sections in the kav4proxy.conf
configuration file:
[icapserver.groups:managers]
Priority=2
ClientIP=192.168.10.0/255.255.255.0
URL=.*

[icapserver.engine.options:managers]
Cure=yes

[icapserver.actions:managers]
CuredAction=skip
ErrorAction=deny
ProtectedAction=skip
36 Kaspersky Anti-Virus for Proxy Server

5.2. Anti-virus scan settings


Anti-virus engine parameters in the [icapserver.engine.options:<group
name>] define the modes for scanning and disinfection of requested objects
within a corresponding group as follows:
• ScanPacked=yes|no – enables/ disables scanning of packed files. If the
mode is disabled, all packed objects are considered to be clean.
• ScanArchives=yes|no – enables/ disables scanning of objects inside
archives. If the mode is disabled, all archive files are considered to be
clean.
• ScanMailBases=yes|no – enables/ disables scanning of mail databases
(requested or transferred via a proxy server). If the mode is disabled, all
mail databases are considered to be clean.
• ScanMailPlain=yes|no – enables/ disables scanning of mail messages in
plain text format (requested or transferred via a proxy server). If the mode
is disabled, all databases of plain text mail are considered to be clean.
• UseHeuristic=yes|no – enables/ disables heuristic analyzer used for
anti-virus scanning.
• Cure=yes|no – enables/ disables disinfection of infected objects. If the
mode is disabled, the application will not attempt to cure an infected file.
The [icapserver.engine] section contains common parameters of the anti-virus
engine applicable to all groups:
• UseAVbasesSet=standard|extended – the set of the anti-virus
databases used by the application. The extended set contains, in
addition to the records of the standard set, the signatures of potentially
dangerous software such as adware, remote administration utilities, etc.

5.3. The choice of actions over


scanned objects
Actions performed by the application on scanned objects are defined by the
status assigned to those objects as a result of an anti-virus check.
Kaspersky Anti-Virus uses the following statuses:
• OK – clean object that has successfully passed the scanning procedure.
Additional settings of Kaspersky Anti-Virus 37

• INFECTED – the object is infected and cannot be cured or disinfection


has not been attempted.
• CURED – the object was infected; it has been cured successfully.
• WARNING – the object contains code that resembles a known virus.
• SUSPICIOUS – the object is suspected of being infected with an
unknown virus.
• PROTECTED – the object is password-protected and therefore it cannot
be scanned.
• CORRUPTED – the object is damaged.
• ERROR – object scanning resulted in an error.
Actions performed by Kaspersky Anti-Virus over objects with a specific status are
determined by the parameters in the [icapserver.actions] section (for the
default group) and [icapserver.actions:<group name>] section (for groups
created by the administrator):
• InfectedAction – action over an infected object that has not been cured
or cannot be cured.
• SuspiciousAction – action over an objects suspected of being infected
with an unknown virus.
• WarningAction – action over an object containing code that resembles a
known virus.
• ErrorAction – action over an object that has been assigned the ERROR
status.
• ProtectedAction – action over a password-protected object.
• CorruptedAction – action over a damaged object.
• CuredAction – action over a disinfected object.
The listed parameters can take the following values:
• skip – allows object transfer.
• deny – prohibits object transfer replacing such object with a
corresponding notification file.
If deny is the action used on an object, then, depending upon the object's status,
it will be replaced with one of the following placeholder files located in the
/opt/kav/5.5/kav4proxy/share/notify: directory:
• object_infected – template containing a notification about detection of an
infected object.
38 Kaspersky Anti-Virus for Proxy Server

• object_suspicious – template containing a notification about detection of


an object suspected of being infected with an unknown virus.
• object_warning – template containing a notification about detection of an
object that resembles the code of a known virus.
• object_protected – template containing a notification about detection of
a password-protected object.
• object_error – template containing a notification about detection of an
object, which has caused a scanning error.
• object_corrupted – template containing a notification about detection of
a damaged object.
• object_cured – template containing a notification about detection of an
infected object that has been successfully cured.
Administrators can modify the text of these templates at their discretion including
addition of special macros (see Appendix A.2 on p. 55).

Example: Specify the following actions over scanned objects for the
default group:
• allow transfer of the objects that have been assigned the
CURED and PROTECTED status
• prohibit transfer of all other objects.

Solution: to accomplish the task, log in as the root (or any other
privileged user) and specify the following parameter values in the
[icapserver.actions] section:
[icapserver.actions]
CuredAction=skip
ProtectedAction=skip
InfectedAction=deny
SuspiciousAction=deny
WarningAction=deny
ErrorAction=deny
CorruptedAction=deny

5.4. Administrator notifications


Every time when the application performs the deny action over an object
transferred through the proxy, it also runs a special script. The string launching
Additional settings of Kaspersky Anti-Virus 39

the script is defined by the NotifyScript parameter in the


[icapserver.notify:<group name>] section of the application configuration file.
Below you can examine a sample notification script and the steps necessary to
configure the application to run the script.
Administrators can use SHELL syntax to create their own custom
scripts, which will be executed every time when the application blocks
an object transfer via proxy after its scanning. Every group created by
the administrator can be assigned its own notification script (please
refer to section 5.1 on p. 34 for details about groups).

In order to configure the application to send notifications about blocked


objects to admin@test.local, perform the following steps

1. Create an executable script file with the following contents:


#!/bin/sh
recipients='admin@test.local'

/usr/lib/sendmail -t -i<<EOT
From: Kaspersky Anti-Virus For Proxy Server
<root@$HOSTNAME>
To: $recipients
Subject: %VERDICT% object requested

Action applied: %ACTION%


Verdict: %VERDICT%
Requested URL: %URL%
Client IP: %CLIENT_ADDR%

Found:
Infected: %VIRUS_LIST%
Cured: %CURED_LIST%
Suspicios: %SUSP_LIST%
Warnings: %WARN_LIST%

This message generated by %PRODUCT% at %DATE% on


$HOSTNAME
EOT
40 Kaspersky Anti-Virus for Proxy Server

During script creation you can use special macros, such


as %URL%, %CLIENT_ADDR%, etc. to specify
additional information. Please refer to section A.2 on p. 55
for details on macros.
2. Save the script file and make sure that the kluser user account has
sufficient privileges for its execution.
3. Set the script launch string as the value of the NotiftyScript
parameter. E.g., if the script has been saved to the
/usr/local/bin/notify.sh file, and it should be executed whenever
objects processed according to the default group rules get
blocked, specify the following value for the NotiftyScript parameter
in the [icapserver.notify] section:
[icapserver.notify]
NotifyScript=/usr/local/bin/notify.sh

5.5. Operation modes


Depending upon the status of the license and the anti-virus databases, the
application can function in one of the following modes:
• Basic mode – fully functional mode of application operation. In that mode
the application performs anti-virus scanning of proxy traffic and
disinfection of infected objects (if enabled).
• Operation without updates – the mode used by the application when
the current license expires. In that mode the application performs anti-
virus scanning of proxy traffic and, if enabled, disinfection of infected
objects using the anti-virus databases current at the moment of license
expiry.
• Unlicensed operation – the mode used by the application in cases when
the license key is not installed or an error has occurred while loading the
information about the current license. In such situation the application
does not perform anti-virus scanning of proxy traffic and applies to all
objects the action defined by the LicenseErrorAction parameter.
• Operation without the anti-virus databases – the mode used by the
application if its anti-virus databases are not installed or if an error has
occurred while loading them. In that mode the application does not
perform anti-virus scanning of proxy traffic and applies to all objects the
action defined by the BasesErrorAction parameter.
Additional settings of Kaspersky Anti-Virus 41

5.6. Modes of interaction with proxy


via ICAP
The mode used by Kaspersky Anti-Virus for work with a proxy server is defined
by the AnswerMode parameter, which can take the following values:
• partial – in that mode Kaspersky Anti-Virus sends to proxy parts of the
object being scanned with the frequency determined by the
MaxSendDelayTime parameter for their further transfer to the user. The
last part of an object will only be sent to user when the anti-virus scanning
of the object is complete and only if the resulting status does not mean
that the deny action should be applied to that object. If the deny action is
applied to the object, then the application in that mode does not send a
template-based file to the user (see section 5.3 on p. 36); instead, the
application will initiate disconnection.
The mode described above is convenient when large files are
downloaded. In that case users begin receiving objects before
completion of an anti-virus check because otherwise a user
may terminate connection before he/she receives response
because of a long waiting period.
• complete – in that mode Kaspersky Anti-Virus returns an object to proxy
server only after it is downloaded and tested completely, and provided
that the deny action does not apply to its resulting status. If the deny
action is applied to the object according to the results of anti-virus
scanning, then the application will return to the user a template-based file
instead of the requested object (see section 5.3 on p. 36).

When the complete mode is used, please keep in mind that


after a click on an object in browser the user will not see a
window with an offer to save the object or cancel scanning
until that object is completely downloaded by the proxy server
and scanned by Kaspersky Anti-Virus. User can only cancel
the download by closing the browser window thus terminating
the connection.

5.7. Application statistics logging


Kaspersky Anti-Virus provides two types of statistical information for
administrators:
• Statistics on the results of anti-virus scanning and processing
42 Kaspersky Anti-Virus for Proxy Server

• General statistics of application activity.


Statistics of anti-virus processing can be written to a local file or to a network
socket. In order to make the application log its statistics to a local file, specify the
path to that file as the value for the AVStatisticsFile parameter. The
AVStatisticsAddress parameter is intended to specify a network socket.
Every line in the resulting statistics file will contain information about a single
tested object in the following format:
Time Size Verdict Virus_info IP URL
Table 2 contains a summary of all these parameters.
Table 2. Statistics parameters

Alias Meaning

Time Date of object scanning.

Size Object size.

Verdict Status assigned to an object after an anti-


virus check.

Virus_info List of revealed viruses.

IP IP address of the client that has requested


an object.

URL URL of a requested object.

If for some reason output of a report on a processed object is impossible,


information about such object will not be logged.
In addition to the statistics of anti-virus scanning, the application also uses
special counters, which return statistical information about its activity. Counter
values can be output to a file specified as the CounterStatisticsFile parameter
in the application configuration file. The resulting file will contain a log of values
returned by counters described in Table 3.
Table 3. Counters of application activity

Counter Description

Total_requests Total number of processed scan requests.


Additional settings of Kaspersky Anti-Virus 43

Infected_requests The number of requests, which returned infected,


suspicious objects or objects resembling a known
virus identified during processing.

Protected_requests The number of requests, which returned protected


objects identified during processing.

Error_requests The number of requests, which returned objects


causing processing errors.

Total_traffic The total volume of processed traffic (MB).

Infected_traffic The total volume of infected traffic (MB).

Traffic_per_min Average MB per minute.

Request_per_min Average number of ICAP requests processed per


minute.

Total_connections The number of active connections to ICAP server.

Total_processes The total number of running processes working on


user requests.

Idle_processes The number of idle processes waiting for requests.

5.8. Application reporting


parameters
Results of operations performed by Kaspersky Anti-Virus components are
summarized in a report output to a log file in text format (ReportFileName
parameter in the [icapserver.report] section) or to the system log (syslog). If an
empty string is set as the value of the ReportFileName parameter
(ReportFileName=), no information of application activity will be logged.
The amount of output information can be altered by changing the report detail
level (ReportLevel parameter in the [icapserver.report] section).
44 Kaspersky Anti-Virus for Proxy Server

The level of detail is a number that sets the level of verboseness for information
regarding the components’ work. Each subsequent level includes information of
the previous level together with some additional data.
Possible levels of report details are listed in the table 4 below.
Table 4. Levels of report details
Level Level letter
Level symbol Meaning
name

0 Fatal F Information about critical errors


Errors only (i.e. errors, which cause
program termination because
some actions cannot be
performed). E.g., component
infection or an error while
initializing or loading databases
and license keys.

1 Errors E Information about other errors


including those, which do not
cause termination of components'
activity, for example, information
about an error encountered during
file scanning.

2 Warning W Notifications about errors that may


lead to the application shutdown
(license key expiration warning,
out-of-disk-space warning, etc.).

3 Info, I Important informational


Notice messages, such as whether a
component is running or inactive,
the path to the configuration file,
latest changes in scan area,
database updates, license keys,
statistics summary.

4 Activity A Messages about scanning of files


in accordance with the level of
details defined for the report.

9 Debug D All debug messages.


Additional settings of Kaspersky Anti-Virus 45

Information about fatal errors is displayed always, regardless of the report detail
level. The optimal level is level 4, which is also the default level.
Information messages may be subdivided into the following types:
• Messages pertaining to anti-virus checks.
• Messages pertaining to the operation of the application.
The output format for each of the detail levels listed above is as follows:
[DD-MM-YY HH:MM:SS L] STRING
where
DD-MM-YY HH:MM:SS stand for the date and time of record creation in the
format defined by the DateFormat and TimeFormat parameters.
L – letter symbol indicating the selected level of details in report.
STRING – test containing information about an event that has occurred.
E.g., information about the results of anti-virus scan for an object will be logged
in the following format:
[DD-MM-YY HH:MM:SS A] CLIENT_IP URL VERDICT [INFO]
where
DD-MM-YY HH:MM:SS stand for the date and time of record creation in the
format defined by the DateFormat and TimeFormat parameters.
А means the Activity level.
CLIENT_IP – IP address of the client that has requested on object.
URL – URL of the requested object.
VERDICT – object status according to the results of its anti-virus scanning.
INFO – additional information, for instance, name of a detected virus.

5.9. Memory dump creation for


detection of errors
Memory dump files or core files are created during an emergency shutdown of
the application process; they can be used later by experts at Kaspersky Lab to
identify the cause of problems in the operation of Kaspersky Anti-Virus.
Creation of core files is disabled by default, it is only recommended for detection
of problems causing abnormal termination of the application processes.
46 Kaspersky Anti-Virus for Proxy Server

In order to enable creation of memory dump files, specify the


/var/log/kav/5.5/kav4proxy/core path as the value for the CorePath parameter
in the [icapserver.path] of the application configuration file.

Make sure that the partition where the


/var/log/kav/5.5/kav4proxy/core directory is located has sufficient free
disk space for storage of core files.
In addition, in FreeBSD-based systems a modification of system kernel
parameters may be necessary. It can be performed by running the following
command as root:
# sysctl -w kern.sugid_coredump=1
Now in case of an emergency shutdown of the application processes a file
containing a dump of its memory will be created in the
/var/log/kav/5.5/kav4proxy/core directory.
As soon as the core files have been used to collect the necessary information,
you are advised to disable their creation and roll back the modifications (if any) to
the system kernel in FreeBSD-based systems:
# sysctl -w kern.sugid_coredump=0

5.10. Work with Internet


broadcasting stations
Anti-virus processing by Kaspersky Anti-Virus of web traffic generated by Internet
radio stations can interrupt the data stream transfer or the proxy server operation
making thus listening to broadcasts via a proxy a bit complicated. In such cases
it is recommended to exclude such traffic from the scope of anti-virus scanning
using the ExcludeMimeType parameter, for example:
[icapserver.filter]

ExcludeMimeType=^audio/mpeg$
ExcludeMimeType=^application/vnd.ms.wms-hdr.asfv1$
ExcludeMimeType=^application/x-mms-framed$

The settings above will exclude from the scope of anti-virus scanning data
streams in MPEG, ASF and Microsoft Windows Media formats. Add to the
excluded MIME types of data streams the format used by the Internet radio
station that you would like to listen to.
CHAPTER 6. UNINSTALLING
THE APPLICATION

Depending upon the distribution package selected for installation of the


application, removal of Kaspersky Anti-Virus from a server running Linux will
require one of the following steps:
• To uninstall the application installed from an .rpm package, type the
following in the command line:
# rpm –e <distribution_package_name>
• To uninstall the application installed from a .deb package, type the
following in the command line:
# dpkg –r <distribution_package_name>
In order to remove Kaspersky Anti-Virus from a server running FreeBSD, type
the following in the command line:
# pkg_delete <distribution_package_name>
The procedure removing Kaspersky Anti-Virus runs automatically; it successively
performs the following operations:
1. Removal of the cron task updating the anti-virus databases from the list
of tasks for the kluser user.
2. Restoration of the original settings in the configuration file of Squid proxy
(used before installation of Kaspersky Anti-Virus), and proxy restart.
3. Termination of the application services.
4. Roll-back of the registration for automatic start-up of application services
in the system.
5. Removal of temporary files and directories created while Kaspersky Anti-
Virus was running.
6. Removal of application files: the procedure deletes all directories and
files of the Anti-Virus including the anti-virus databases installed with the
package. The only exception includes reports, configuration files and
backup directory, which will not be deleted.
APPENDIX A. APPLICATION
REFERENCE
A.1. kav4proxy.conf application
configuration file
This appendix is devoted to a detailed description of the kav4proxy.conf file
containing default settings used immediately after Kaspersky Anti-Virus
installation on a server.

The [path] section contains the parameters that define paths to the directories
essential for the application's functioning:

BasesPath – full path to the directory where the anti-virus databases are
stored.
LicensePath – full path to the directory where the license keys for the
application are stored.
TempPath – full path to the directory where the temporary files of the
application are stored.

The [options] section contains the parameters that define the user and the
group used to run the application:

User – name of the user whose privileges the application uses to run.
Group – name of the group whose privileges the application uses to run.

The [locale] section contains the parameters that define the date and time
format in reports and application statistics:

DateFormat=%d-%m-%Y – date format in application activity report.


TimeFormat=%H:%M:%S – time format in report.

The [icapserver.engine] section contains the parameters of the anti-virus


engine:

UseAVbasesSet=standard|extended – the set of the anti-virus databases


used by the application. The extended set contains, in addition to the
Appendix A 49

records of the standard set, the signatures of potentially dangerous


software such as adware, remote administration utilities, etc.

The [icapserver.network] section contains network settings of the application:

ListenAddress – IP address and the port that Kaspersky Anti-Virus uses to


wait for proxy requests sent via ICAP. Default value: 0.0.0.0:1344 (the
application listens on port 1344 using all network interfaces of the
server).
Timeout – network timeout for interaction via ICAP.

The [icapserver.process] section contains advanced settings for the processes


of Kaspersky Anti-Virus:

MaxChildren – maximum number of running child processes working on


requests sent via ICAP.
IdleСhildren – maximum number of running child processes waiting for
requests sent via ICAP.
MaxReqsPerChild – maximum number of requests to scan objects that a
child process can serve. After processing of the specified number of
requests a child process terminates and the application initiates a new
child process.
MaxEnginesPerChild – maximum number of scanning modules used
simultaneously by child processes for anti-virus scanning of objects.

Larger number of scanning modules allows faster anti-virus


scanning of objects. However, if affects server performance.
Please take into account the hardware of your server while
setting the value of this parameter.
The [icapserver.protocol] section contains the settings for interaction between
Kaspersky Anti-Virus and proxy server via ICAP:

AnswerMode=partial|complete – the method of interaction with the proxy.


The partial value means that Kaspersky Anti-Virus will allow transfer of
scanned object's parts to client before the object is downloaded from
the Internet completely and scanned. The complete value means that
Kaspersky Anti-Virus will only allow transfer of a requested object to
client after it is downloaded completely and scanned.
MaxSendDelayTime – time interval (seconds) that determines the
frequency used to send parts of a requested object to client in partial
mode.
50 Kaspersky Anti-Virus for Proxy Server

HTTPClientIpField – name of the HTTP field to be used for identification of


client's IP address.

The [icapserver.statistics] section contains the parameters pertaining to the


generation of application statistics:

CounterStatisticsFile – path to the file where the values of statistics


counters will be stored.
AVStatisticsFile – path to the file where anti-virus scanning statistics will be
stored.
AVStatisticsAddress – network socket for logging of the anti-virus
scanning statistics.

The [icapserver.report] section contains the parameters pertaining to report


generation by the application:

ReportFileName – file for a report on application activity.


Buffered=yes|no – buffer mode for recording to the report file. In order to
disable the mode, set no as the parameter value.
ReportLevel – level of details in report.
ShowOk=yes|no – the logging mode for information about objects where
scanning revealed no malicious code.
Append=yes|no – report generation mode in which the report is created
anew each time the application starts. If you wish to add new
information to an existing report instead of overwriting it, set the
parameter value to yes.

Sections described above contain the anti-virus processing parameters


for the default group. Please refer to section 5.1 on p. 34 for details
about creation of your own groups.
The [icapserver.path] section contains parameters that define the paths to
special application files:

PidFile – path to the PID file of the application. Default value:


/var/run/kavicapserver.pid.
CorePath – directory for storage of memory dump files (core files) created in
case of emergency termination of the application. The default empty
value disables creation of core files. To enable memory dump creation,
specify /var/log/kav/5.5/kav4proxy/core as the value for that
parameter.
Appendix A 51

The [icapserver.groups] section contains the default group parameters:

Priority – group priority. If request parameters match several groups then


the processing will use the rules of the group with the highest priority.
ClientIP – IP address of the client that has requested an object through
proxy. Objects requested from a specified IP address and located at an
address defined by the URL parameter will be processed using the
rules of this group. The following information can be used to specify the
value for the ClientIP parameter:
• IP addresses
ClientIP=192.168.12.1
• Network addresses
ClientIP=192.168.12.0/24
ClientIP=192.168.12.1/255.255.255.0
Regular expressions are also allowed as the values, e.g.:
ClientIP=^192\.168\.12\..*
- the value will represent all addresses within the 192.168.12.0 –
192.168.12.255 range.
To define different IP addresses, you can specify the ClientIP parameter
several times, for example:
[icapserver.groups]
ClientIP=192.168.20.1/24
ClientIP=192.168.30.1
URL – URL of a requested object. Objects with a specified URL and
requested from an IP address defined by the ClientIP parameter will be
processed using the rules of this group.

While a URL has to be specified, you should enter the


^ . [ $ ( ) | * + ? { \ symbols between the \. escape characters.
Thus, for example, the correct form of the www.example.com
address will look as follows:
URL=www\.example\.com
The notation is compliant with the POSIX Extended Regular
Expression syntax.
52 Kaspersky Anti-Virus for Proxy Server

The [icapserver.filter] section contains filtration parameters for the default


group:

ExcludeMimeType – exception mask for filtering by MIME type (regular


expressions can be used). The application will not perform anti-virus
scanning of objects with MIME type, which does not match the specified
mask.
ExcludeURL – exception mask for filtering by URL type (POSIX Extended
Regular Expressions can be used). The application will not perform anti-
virus scanning of objects with URL which matches the specified mask.
You can define more than one exception mask using masks
with ExcludeURL and ExcludeMimeType if you specify
these parameters several times in a section, for example:
ExcludeURL=www\.example\.com.*
ExcludeURL=www\.localsite\.local.*
MaxScanTime – maximum duration of single object scanning. If an object is
not checked within the specified interval, such object will be assigned
the OK status.
MaxRequestLength – maximum size of the objects to be scanned.

The [icapserver.engine.options] section contains the anti-virus scanning


parameters for the default group:

ScanPacked=yes|no – instruction to scan packed files. To disable this


mode, set the parameter to no.
ScanArchives=yes|no – instruction to check archived objects. To disable
this mode, set the parameter to no.
ScanMailBases=yes|no – instruction to scan e-mail databases (requested
or transferred through proxy server). To disable this mode, set the
parameter to no.
ScanMailPlain=yes|no – instruction to scan databases of mail messages in
plain text format (requested or transferred through proxy server). To
disable this mode, set the parameter to no.
UseHeuristic=yes|no – instruction to use heuristic analyzer during anti-
virus scanning. To disable this mode, set the parameter to no.
Cure=yes|no – instruction to cure infected objects. To disable this mode,
set the parameter to no.
Appendix A 53

The [icapserver.actions] section contains the settings for actions over scanned
objects for the default group:

CuredAction – action over disinfected objects.


InfectedAction – action over infected objects.
SuspiciousAction – action over suspicious objects.
WarningAction – action over an object resembling a known virus.
ErrorAction – action over an object, which has caused a scanning error.
ProtectedAction – action over password-protected objects.
CorruptedAction – action over damaged objects.
LicenseErrorAction – action over scanned objects if the application has
failed to load the license key information.
BasesErrorAction – action performed over objects in cases, when the
application fails to load the anti-virus databases.

The [icapserver.notify] section contains notification parameters for the default


group:

NotifyTemplateDir – directory where the notification templates are stored.


NotifyScript – script used by the application to notify the administrator
about objects prohibited for transfer through the proxy server.

The [updater.path] section contains the paths to directories and files necessary
for the functioning of the keepup2date component:

BackUpPath – path to the directory where an archive of the anti-virus databases


is preserved during their update. This is a mandatory parameter.
UploadPatchPath – path to the directory containing application patches.
PidFile – path to PID file. It is used to prevent simultaneous launch of several
instances of the keepup2date component. If the parameter is missing, the
PID file will not be created. Consequently, no checks for other running
instances of the component will be performed.
AVBasesTestPath – full path to the avbasestest utility validating the anti-virus
databases. The application uses it immediately after downloading of
updates. Only if the received updates are intact, they will be copied from a
temporary folder to the storage directory. If this parameter is not specified,
then during an update the updater will output to the console and log file a
message informing about inability to check the downloaded anti-virus
databases; the updates will be installed then without further validation.
54 Kaspersky Anti-Virus for Proxy Server

The avbasestest utility starts automatically, it does not require


user participation.

The [updater.options] section contains various parameters of the keepup2date


component:

KeepSilent=yes|no – the mode used for output of component messages to the


console. When the parameter is set to yes the component does not output
reports to the console. Default value: no.
PostUpdateCmd – command performed immediately after an update of the anti-
virus databases. The value specified in the configuration file included into
the product package forces the application to reload the updated anti-virus
databases automatically. Modification of this parameter is not
recommended.
UseUpdateServerUrl=yes|no – parameter, which defines whether the updater
will use for its purposes the address defined by the UpdateServerUrl
parameter. Default value: no.
UseUpdateServerUrlOnly=yes|no – parameter, which defines whether the
application will use for updates the address defined by the UpdateServerUrl
parameter only. When set to no, a failed attempt to update databases using
the UpdateServerUrl address as the source will be followed by an attempt
to use another address from the list of update servers. Default value: no.
UpdateServerUrl=http://url/ | ftp://url/ | /local_path/ – source address for
updating of the anti-virus databases.
RegionSettings – the region where the user is located. It is used to select an
update server of Kaspersky Lab, which is more convenient for downloading
of updates to the anti-virus databases. Default value: Russia. In order to
receive a list of all regions, run the keepup2date utility with the –s command
line option.
ConnectTimeout – timeout (seconds) for network operations during updates of
the anti-virus databases. Default value: 30.
UseProxy=yes|no – the mode of proxy use during connection with an update
server of Kaspersky Lab. When set to no, proxy server will not be used. If
the parameter is set to yes, the component will use the proxy address
defined by the ProxyAddress parameter. If the ProxyAddress parameter
value is undefined, then the http_proxy environment variable will be used. If
the environment variable is not defined, proxy server will not be used.
ProxyAddress – address of the proxy server used for connection. This
parameter is defined as http://username:password@url:port. Username
and/or password may be missing in a proxy address. If no address is
specified, its value will be taken from the http_proxy environment variable.
Appendix A 55

PassiveFtp=yes|no – the parameter determines the use of passive FTP mode.


Default value: no.

The [updater.report] section contains the settings for output of reports by the
keepup2date component:

ReportFilename – name of the file used for logging of a report on the


component's activity.
ReportLevel=0|1|2|3|4|9 – level of details in the report on the component's
activity (0 – Fatal, 1 – Error, 2 – Warning, 3 – Info, 4 – Activity,
9 – Debug). Default value: 4.
Append=yes|no – instruction to append a report to the end of an existing report
file. When the parameter is set to no, previous file contents will be deleted
after logging to it. Default value: yes.

A.2. Macros
Kaspersky Anti-Virus allows using special macros in template-based placeholder
files sent to users instead of blocked objects (see section 5.3 on p. 36) and in the
text of the notification script (the NotifyScript parameter). Table 5 contains a
description of these macros.
Table 5. Macros

Macro syntax Description

%VIRUS_LIST% List of viruses that an object is infected with.

%WARN_LIST% List of objects containing code that


resembles a known virus.

%SUSP_LIST% List of objects suspected of infection with an


unknown virus.

%CURED_LIST% List of removed viruses.

%CLIENT_ADDR% IP address of the client computer that has


requested an object.

%URL% Requested object URL


56 Kaspersky Anti-Virus for Proxy Server

%ACTION% Action performed on an object.

%VERDICT% Object status.

%PRODUCT% Product description.

%DATE% Time of message creation.

A.3. kavicapserver return codes


30 Fatal system error.

65 Error loading the configuration file (file not found).

66 Error in the configuration file or command line parameters.

70 The component executable file is corrupted.

0 No errors detected at component start.

A.4. Command line options for


licensemanager
Help options

-h Display on the console reference information about


the command line options supported by the
component and exit.

Command line options for managing license keys

-s Output information about all installed license keys to


the console.

-c (С) <path_to_file> Use the alternative configuration file <path_to_file>.


Appendix A 57

-k Output to the console information about the license


<key_file_name> key.

-a <path_to_file> Install a license key.

-d <a|r> Delete the current/additional key.

A.5. Licensemanager return codes


The licensemanager component may return any of the following codes while
running:

0 The component has successfully completed its operation.

30 Fatal system error.

64 Licensing error.

65 Error reading the configuration file.

66 Error in command line options.

70 The component executable file is corrupted.

A.6. Keepup2date command line


options
Help options

-h Display on the console reference information about the command line


options supported by the component and exit.

-v Display the application version on the console and exit.

-s Display a list of update servers with information about their respective


regions.
58 Kaspersky Anti-Virus for Proxy Server

Update options

-c <path_to_file> Use the alternative configuration file <path_to_file>.

-u <directory> Copy the application update to the local <directory>.


Within the specified directory, the utility will reproduce a
structure identical to the internal structure of an update
server, thus enabling local computers to update from
that directory.

-x <directory> Copy updates for all products of Kaspersky Lab to the


local <directory>. Within the specified directory, the
utility will reproduce a structure identical to the internal
structure of an update server, thus enabling local
computers to update from that directory.

-b <path> When updating, create in the <path> directory a


backup copy of the anti-virus databases being updated.

-t <path> Use the <path> directory to store temporary files.

-r Cancel the last update. Updated databases will be


replaced by their previous versions.

-k Disable execution of the command defined by the


PostUpdateCmd parameter.

-d <path_to_file> Use the specified PID file.

-g <url> Use the server with the specified URL as the source of
updates.

Report generation options

-l <path_to_file> Log work results in file <path_to_file>.

-q Disable output of messages about the operation of the


utility.

-e Output fatal error messages only.


Appendix A 59

A.7. Keepup2date return codes


The keepup2date component may return any of the following codes while
running:

0 The anti-virus databases do not need an update.

1 The anti-virus databases were updated successfully.

10 A fatal error occurred; updating was interrupted.

12 An error while rolling back to the previous version of the anti-virus


databases. Rollback has been interrupted.

30 The PostUpdaterCmd command could not be executed after the


databases were updated.

60 License information is missing or no license key was found using the


path specified in the configuration file.

75 The configuration file cannot be loaded or contains errors.

128 + Application has exited upon a signal with the corresponding code.
signal
code
APPENDIX B. KASPERSKY LAB
Founded in 1997, Kaspersky Lab has become a recognized leader in information
security technologies. It produces a wide range of data security software and
delivers high-performance, comprehensive solutions to protect computers and
networks against all types of malicious programs, unsolicited and unwanted e-
mail messages, and hacker attacks.
Kaspersky Lab is an international company. Headquartered in the Russian
Federation, the company has representative offices in the United Kingdom,
France, Germany, Japan, USA (CA), the Benelux countries, China, Poland, and
Romania. A new company department, the European Anti-Virus Research
Centre, has recently been established in France. Kaspersky Lab's partner
network incorporates more than 500 companies worldwide.
Today, Kaspersky Lab employs more than 450 specialists, each of whom is
proficient in anti-virus technologies, with 10 of them holding M.B.A. degrees, 16
holding Ph.Ds, and senior experts holding membership in the Computer Anti-
Virus Researchers Organization (CARO).
Kaspersky Lab offers best-of-breed security solutions, based on its unique
experience and knowledge, gained in over 14 years of fighting computer viruses.
A thorough analysis of computer virus activities enables the company to deliver
comprehensive protection from current and future threats. Resistance to future
attacks is the basic policy implemented in all Kaspersky Lab's products. At all
times, the company’s products remain at least one step ahead of many other
vendors in delivering extensive anti-virus coverage for home users and corporate
customers alike.
Years of hard work have made the company one of the top security software
manufacturers. Kaspersky Lab was one of the first businesses of its kind to
develop the highest standards for anti-virus defense. The company’s flagship
product, Kaspersky Anti-Virus, provides full-scale protection for all tiers of a
network, including workstations, file servers, mail systems, firewalls, Internet
gateways, and hand-held computers. Its convenient and easy-to-use
management tools ensure advanced automation for rapid virus protection across
an enterprise. Many well-known manufacturers use the Kaspersky Anti-Virus
kernel, including Nokia ICG (USA), F-Secure (Finland), Aladdin (Israel), Sybari
(USA), G Data (Germany), Deerfield (USA), Alt-N (USA), Microworld (India) and
BorderWare (Canada).
Kaspersky Lab's customers benefit from a wide range of additional services that
ensure both stable operation of the company's products, and compliance with
specific business requirements. Kaspersky Lab's anti-virus database is updated
every hour. The company provides its customers with a 24-hour technical
support service, which is available in several languages to accommodate its
international clientele.
Appendix B 61

B.1. Other Kaspersky Lab Products


Kaspersky Anti-Virus® Personal
®
Kaspersky Anti-Virus Personal has been designed to provide anti-virus
protection to personal computers running Microsoft Windows 98/ME or Microsoft
Windows 2000/NT/XP against all known viruses, including potentially dangerous
software. Kaspersky Anti-Virus Personal provides real-time monitoring of all
sources of virus intrusion - e-mail, Internet, floppy disks, CD, etc. The unique
system of heuristic data analysis allows efficient neutralization of yet unknown
viruses. This application can work in the following modes (that can be used
separately or jointly):
• Real-time computer protection - anti-virus scanning of all objects run,
opened on or saved to the user’s computer.
• On-demand computer scan - scanning and disinfection of the entire
user’s computer or of individual disks, files or folders. You can start such
scan manually or configure an automatic scheduled scan.
Kaspersky Anti-Virus® Personal does not re-scan objects that had already been
scanned during a previous scan and have not changed since then not only when
performing real-time protection, but also during an on-demand scan. This feature
considerably increases the speed of the program’s operation.
The application creates a reliable barrier against viruses when they attempt to
®
intrude your computer via e-mail. Kaspersky Anti-Virus Personal performs
automatic scan and disinfection of all incoming and outgoing mail sent or
received using POP3 and STMP protocols and provides highly efficient detection
of viruses in mail databases.
The application supports over 700 formats of archived and compressed files and
provides automatic scanning of their content as well as removal of malicious
code from ZIP, CAB, RAR, ARJ, LHA and ICE archives.
Configuring the application is made simple and intuitive due to the possibility to
select one of three preset protection levels: Maximum Protection,
Recommended or High Speed.
The anti-virus database is updated every hour and its delivery to your computer
is guaranteed even when your computer gets temporarily disconnected from the
Internet or the connection has to be changed.
Kaspersky Anti-Virus® Personal Pro
This package has been designed to deliver comprehensive anti-virus protection
to home computers running Microsoft Windows 98/ME, Microsoft Windows
2000/NT, Microsoft Windows XP as well as MS Office applications. Kaspersky
Anti-Virus Personal Pro includes an easy-to-use application for automatic
62 Kaspersky Anti-Virus for Proxy Server

retrieval of daily updates for the anti-virus database and the program modules. A
unique second-generation heuristic analyzer efficiently detects unknown viruses.
A simple and convenient interface allows users to configure the program quickly
making work with it easier than ever.
®
Kaspersky Anti-Virus Personal Pro has the following features:
• On-demand scan of local disks.
• Real-time automatic protection of all accessed files from viruses.
• Mail Filter automatically scans and disinfects all incoming and outgoing
mail for any mail client that uses POP3 and SMTP protocols and
effectively detects viruses in mail databases.
• Behavior blocker that provides maximum protection of MS Office
applications against viruses.
• Archive scanning – Kaspersky Anti-Virus recognizes over 900 formats of
archived and compressed files and ensures automatic anti-virus scanning
of their content and removal of malicious code from files within ZIP, CAB,
RAR, ARJ, LHA and ICE archives.

Kaspersky® Anti-Hacker
®
Kaspersky Anti-Hacker is a personal firewall that is designed to safeguard a
computer running any Microsoft Windows operating system. It protects your
computer against unauthorized access and external hacker attacks from either
the Internet or the local network.
®
Kaspersky Anti-Hacker monitors the TCP/IP network activity of all applications
®
running on your machine. When it detects a suspicious action, Kaspersky Anti-
Hacker blocks the suspicious application from accessing the network. This helps
ensure enhanced privacy and 100% security of confidential data stored on your
computer.
The product’s SmartStealth™ technology prevents hackers from detecting your
computer from the outside. In this stealthy mode, the application works
seamlessly to keep your computer protected while you are on the Web. The
application provides conventional transparency and accessibility of information.
Kaspersky® Anti-Hacker also blocks most common network hacker attacks and
monitors attempts to scan computer ports.
Configuration of the application is simply a matter of choosing one of five security
levels. By default, the application starts in self-learning mode, which will
automatically configure your security system depending on your responses to
various events. This makes your personal guard adjustable to your specific
preferences and your particular needs.
Appendix B 63

Kaspersky® Personal Security Suite


Kaspersky® Personal Security Suite is a software suite designed for organizing
comprehensive protection of personal computers running Microsoft Windows.
The suite prevents malicious and potentially dangerous programs from
penetrating through any possible data sources and protects you from
unauthorized attempts to access your computer’s data, as well as blocking spam.
Kaspersky Personal Security Suite has the following features:
• anti-virus protection of data saved on your computer
• protection against spam for users of Microsoft Office Outlook and
Microsoft Outlook Express
• protection of your computer from unauthorized access, and also from
network hacker attacks from your LAN or the Internet.
Kaspersky Lab News Agent
The News Agent is intended for timely delivery of news published by Kaspersky
Lab, for notifications about the current status of virus activity and fresh news. The
program reads the list of available news channels and their content from news
server of Kaspersky Lab with specified frequency.
The product performs the following functions:
• It visualizes in the system tray the current status of virus activity.
• The product allows the users to subscribe and unsubscribe from news
channels.
• It retrieves news from each subscribed channel with the specified
frequency and notifies about fresh news.
• It allows reviewing news on the subscribed channels.
• It allows reviewing the list of channels and their status.
• It allows opening pages with news details in your browser.
News Agent is a stand-alone Microsoft Windows application, which can be used
independently or may be bundled with various integrated solutions offered by
Kaspersky Lab Ltd.
®
Kaspersky OnLine Scanner
The program is a free service offered to the visitors of Kaspersky Lab's corporate
website. The service allows an efficient online anti-virus scan of your computer.
Kaspersky OnLine Scanner runs within your web browser using Microsoft
®
ActiveX technology. Thus, users can quickly test their computers in case of a
slightest suspicion of malicious infection. Using the service, visitors can:
64 Kaspersky Anti-Virus for Proxy Server

• Exclude archives and e-mail databases from scanning.


• Select standard/extended anti-virus databases for scanning.
• Save a report on the scanning results in txt or html formats.
®
Kaspersky OnLine Scanner Pro
The program is a subscription service offered to the visitors of Kaspersky Lab's
corporate website. The service allows an efficient online anti-virus scan of your
computer and disinfection of dangerous files. Kaspersky OnLine Scanner Pro
runs within your web browser using Microsoft ActiveX® technology. Using the
service, visitors can:
• Exclude archives and e-mail databases from scanning.
• Select standard/extended anti-virus databases for scanning.
• Save a report on the scanning results in txt or html formats.
®
Kaspersky Anti-Virus 6.0
Kaspersky Anti-Virus 6.0 is designed to safeguard personal computers against
malicious software as an optimal combination of conventional methods of anti-
virus protection and new proactive technologies.
The program provides for complex anti-virus checks including:
• Anti-virus scanning of e-mail traffic on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for
outgoing messages) irrespectively of the mail client being used as well
as disinfection of e-mail databases.
• Real-time anti-virus scanning of Internet traffic transferred via HTTP.
• Anti-virus scanning of individual files, directories or drives. In addition, a
preset scan task can be used to initiate anti-virus analysis exclusively
for critical areas of the operating system and start-up objects of
Microsoft Windows.
Proactive protection offers the following features:
• Control of changes within file system. The program allows users to
create a list of applications, which it will control on a per component basis.
It helps protect application integrity against the influence of malicious
software.
• Monitoring of processes in random-access memory. Kaspersky Anti-
Virus 6.0 in a timely manner notifies users whenever it detects dangerous,
suspicious or hidden processes or in case when unauthorized changes in
standard processes occur.
Appendix B 65

• Monitoring of changes in OS registry due to internal system registry


control.
• Blocking of dangerous VBA macros in Microsoft Office documents.
• System restoration after malicious spyware influence accomplished due
to recording of all changes in the registry and computer file system and an
opportunity to perform their roll-back at user's discretion.

Kaspersky® Internet Security 6.0


®
Kaspersky Internet Security 6.0 is an integrated solution for protection of
personal computers against the main information-related threats, i.e. viruses,
hackers, spam and spyware. A common user interface allows configuration and
management of all solution components.
The anti-virus protection feature includes:
• Anti-virus scanning of e-mail traffic on the level of data transmission
protocol (POP3, IMAP and NNTP for incoming mail and SMTP for
outgoing messages) irrespectively of the mail client being used. The
program includes plug-ins for popular e-mail clients (Microsoft Office
Outlook, Microsoft Outlook Express and The Bat!) and supports
disinfection of their e-mail databases.
• Real-time anti-virus scanning of Internet traffic transferred via HTTP.
• File system protection: anti-virus scanning of individual files, directories
or drives. In addition, the application can perform anti-virus analysis
exclusively for critical areas of the operating system and start-up objects
of Microsoft Windows.
• Proactive protection: the program performs constant monitoring of
application activity and processes running in random-access memory
preventing dangerous changes to the file system and registry, and
restores the system after malicious influence.
Protection against Internet-fraud is guaranteed owing to the ability to
recognize phishing attacks, which helps prevent confidential data leaks (first of
all, your passwords, bank account and credit card numbers), and block execution
of dangerous scripts on web pages, pop-up windows and advertisement
banners. The feature blocking charged phone calls helps identify software that
attempts to use your modem for hidden unauthorized connection to paid phone
services and prevents such activity.
Kaspersky® Internet Security 6.0 registers attempts to scan the ports of your
computer, which frequently precede network attacks, and successfully defends
against typical hacker attacks. The program uses defined rules as a basis for
control over all network transactions tracking all incoming and outgoing data
packets. Stealth mode (owing to the SmartStealth™ technology) prevents
66 Kaspersky Anti-Virus for Proxy Server

computer detection from outside. When you switch into that mode, the system
will block all network activity except for a few transactions allowed in user-
defined rules.
The program employs complex approach to anti-spam filtering of incoming e-mail
messages:
• Verification against black and white lists of recipients (including addresses
of phishing sites).
• Inspection of phrases in message body.
• Analysis of message text using a self-learning algorithm.
• Recognition of spam sent in image files.

Kaspersky® Security for PDA


®
Kaspersky Security for PDA provides reliable anti-virus protection for data
saved on various types of hand-held computers and smartphones. The program
includes an optimal set of anti-virus defense tools:
• anti-virus scanner that scans information (saved both in internal memory
of PDA and smartphones or on memory cards of any type) on user
demand;
• anti-virus monitor to intercept viruses in files that are either copied from
other handhelds or are transferred using HotSync™ technology.
Kaspersky® Security for PDA protects your handheld (PDA) from unauthorized
intrusion by encrypting both access to the device and data stored on memory
cards.

Kaspersky Anti-Virus® Business Optimal


This package provides a unique configurable security solution for small- and
medium-sized corporate networks.
®
Kaspersky Anti-Virus Business Optimal guarantees full-scale anti-virus
protection1 for:
• Workstations running Microsoft Windows 98/ME, Microsoft Windows
NT/2000/XP Workstation and Linux.
• File servers running Microsoft Windows NT 4.0 Server, Microsoft
Windows 2000/2003 Server/Advanced Server, Microsoft Windows 2003
Server, Novell Netware, FreeBSD and OpenBSD, Linux, Samba Servers.

1
Depending on the type of distribution kit.
Appendix B 67

• E-mail systems including Microsoft Exchange 2000/2003, Lotus


Notes/Domino, Postfix, Exim, Sendmail, and Qmail.
• Internet gateways: CheckPoint Firewall –1; Microsoft ISA Server 2000
Standard Edition.
The Kaspersky Anti-Virus® Business Optimal distribution kit includes Kaspersky®
Administration Kit, a unique tool for automated deployment and administration.
You are free to choose from any of these anti-virus applications, according to the
operating systems and applications you use.

Kaspersky® Corporate Suite


This package provides corporate networks of any size and complexity with
comprehensive, scalable anti-virus protection. The package components have
been developed to protect every tier of a corporate network, even in mixed
®
computer environments. Kaspersky Corporate Suite supports the majority of
operating systems and applications installed across an enterprise. All package
components are managed from one console and have a unified user interface.
®
Kaspersky Corporate Suite delivers a reliable, high-performance protection
system that is fully compatible with the specific needs of your network
configuration.
Kaspersky® Corporate Suite provides comprehensive anti-virus protection for:
• Workstations running Microsoft Windows 98/ME, Microsoft Windows
NT/2000/XP Workstation and Linux;
• File servers running Microsoft Windows NT 4.0 Server, Microsoft
Windows 2000, 2003 Server/Advanced Server, Novell Netware,
FreeBSD, OpenBSD, Linux and Samba Servers;
• E-mail systems, including Microsoft Exchange Server 2000/2003, Lotus
Notes/Domino, Sendmail, Postfix, Exim and Qmail;
• Internet gateways: CheckPoint Firewall –1; Microsoft ISA Server 2004
Enterprise Edition;
• Hand-held computers (PDAs), running Microsoft Windows CE and Palm
OS, and also smartphones running Microsoft Windows Mobile 2003 for
Smartphone and Microsoft Smartphone 2002.
The Kaspersky® Corporate Suite distribution kit includes Kaspersky®
Administration Kit, a unique tool for automated deployment and administration.
You are free to choose from any of these anti-virus applications, according to the
operating systems and applications you use.
68 Kaspersky Anti-Virus for Proxy Server

Kaspersky® Anti-Spam
Kaspersky® Anti-Spam is a cutting-edge software suite that is designed to help
organizations with small- and medium-sized networks wage war against the
onslaught of unsolicited e-mail messages (spam). The product combines the
revolutionary technology of linguistic analysis with modern methods of e-mail
filtration, including DNS Black Lists and formal letter features. Its unique
combination of services allows users to identify and wipe out up to 95% of
unwanted traffic.
Installed at the entrance to a network, where it monitors incoming e-mail traffic
®
streams for spam, Kaspersky Anti-Spam acts as a barrier to unsolicited e-mail.
The product is compatible with any mail system and can be installed on either an
existing mail server or a dedicated one.
Kaspersky® Anti-Spam’s high performance is ensured by daily updates to the
content filtration database adding samples provided by the Company’s linguistic
laboratory specialists. Databases are updated every 20 minutes.

Kaspersky® SMTP Gateway


Kaspersky® SMTP-Gateway for Linux/Unix is a solution designed for anti-virus
processing of e-mail transmitted via SMTP. The application contains a number of
additional tools for filtering e-mail traffic by name and MIME type of attachments
and a number of tools reducing the load on the mail system and preventing
hacker attacks. DNS Black List support provides protection against e-mails
coming from servers entered in these lists as sources distributing unwanted e-
mail (spam).

Kaspersky Security® for Microsoft Exchange 2003


Kaspersky Security for Microsoft Exchange performs anti-virus processing of
incoming and outgoing mail messages as well as messages stored at the server,
including letters in public folders and filters out unsolicited correspondence using
"smart" spam recognition techniques in combination with Microsoft technologies.
The application scans all messages arriving at an Exchange Server via SMTP
protocol checking them for the presence of viruses using Kaspersky Lab's anti-
virus technologies and for the presence of SPAM attributes. It filters out spam
based on formal attributes (mail address, IP address, letter size, heading) and
analyzes the content of messages and of their attachments using "smart'
technologies, including unique graphic signatures for identifying graphic SPAM.
The application scans both the message body and the attached files.
®
Kaspersky Mail Gateway
Kaspersky Mail Gateway is a comprehensive solution that provides complete
protection for users of mail systems. This application installed between the
corporate network and the Internet scans all components of e-mail messages for
Appendix B 69

the presence of viruses and other malware (Spyware, Adware, etc.) and
performs centralized anti-spam filtration of e-mail stream. This solution also
includes some additional mail traffic filtration features.

B.2. Contact Us
If you have any questions, comments, or suggestions, please refer them to one
of our distributors or directly to Kaspersky Lab. We will be glad to assist you in
any matters related to our product by phone or via e-mail. Rest assured that all of
your recommendations and suggestions will be thoroughly reviewed and
considered.

Technical Please find the technical support information at


support http://www.kaspersky.com/supportinter.html
Helpdesk: www.kaspersky.com/helpdesk.html
General WWW: http://www.kaspersky.com
information http://www.viruslist.com
E-mail: info@kaspersky.com
APPENDIX C. LICENSE
AGREEMENT
End User License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING
LEGAL AGREEMENT ("AGREEMENT") FOR THE LICENSE OF
SPECIFIED SOFTWARE ("SOFTWARE") PRODUCED BY KASPERSKY
LAB ("KASPERSKY LAB").
IF YOU HAVE PURCHASED THIS SOFTWARE VIA THE INTERNET BY
CLICKING THE ACCEPT BUTTON, YOU (EITHER AN INDIVIDUAL OR
A SINGLE LEGAL ENTITY) CONSENT TO BE BOUND BY AND
BECOME PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO
ALL OF THE TERMS OF THIS AGREEMENT, CLICK THE BUTTON
THAT INDICATES THAT YOU DO NOT ACCEPT THE TERMS OF THIS
AGREEMENT, AND DO NOT INSTALL THE SOFTWARE.
IF YOU HAVE PURCHASED THIS SOFTWARE ON A PHYSICAL
MEDIUM, HAVING BROKEN THE CD'S SLEEVE YOU (EITHER AN
INDIVIDUAL OR A SINGLE ENTITY) ARE CONSENTING TO BE
BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF
THE TERMS OF THIS AGREEMENT DO NOT BREAK THE CD's
SLEEVE, DOWNLOAD, INSTALL OR USE THIS SOFTWARE.
IN ACCORDANCE WITH THE LEGISLATION, REGARDING
KASPERSKY SOFTWARE INTENDED FOR INDIVIDUAL CONSUMERS
(KASPERSKY ANTI-VIRUS PERSONAL, KASPERSKY ANTI-VIRUS
PERSONAL PRO, KASPERSKY ANTI-HACKER, KASPERSKY ANTI-
SPAM PERSONAL, KASPERSKY SECURITY SUITE PERSONAL,
KASPERSKY SECURITY FOR PDA) PURCHASED ON LINE FROM
THE KASPERSKY LAB INTERNET WEB SITE, CUSTOMER SHALL
HAVE A PERIOD OF 7 WORKING DAYS AS FROM THE DELIVERY OF
PRODUCT TO MAKE RETURN OF IT TO THE MERCHANT FOR
EXCHANGE OR REFUND, PROVIDED THE SOFTWARE IS NOT
UNSEALED.
REGARDING THE KASPERSKY SOFTWARE INTENDED FOR
INDIVIDUAL CONSUMERS (KASPERSKY ANTI-VIRUS PERSONAL,
KASPERSKY ANTI-VIRUS PERSONAL PRO, KASPERSKY ANTI-
HACKER, KASPERSKY ANTI-SPAM PERSONAL, KASPERSKY
SECURITY SUITE PERSONAL, KASPERSKY SECURITY FOR PDA)
NOT PURCHASED ONLINE VIA INTERNET, THIS SOFTWARE
NEITHER WILL BE RETURNED NOR EXCHANGED EXCEPT FOR
CONTRARY PROVISIONS FROM THE PARTNER WHO SELLS THE
Appendix C 71

PRODUCT. IN THIS CASE, KASPERSKY LAB WILL NOT BE HELD BY


THE PARTNER'S CLAUSES.
THE RIGHT TO RETURN AND REFUND EXTENDS ONLY TO THE
ORIGINAL PURCHASER.
All references to "Software" herein shall be deemed to include the software
activation key ("Key Identification File") with which you will be provided by
Kaspersky Lab as part of the Software.
1. License Grant. Subject to the payment of the applicable license fees, and
subject to the terms and conditions of this Agreement, Kaspersky Lab hereby
grants you the non-exclusive, non-transferable right to use one copy of the
specified version of the Software and the accompanying documentation (the
"Documentation") for the term of this Agreement solely for your own internal
business purposes. You may install one copy of the Software on one computer,
workstation, personal digital assistant, or other electronic device for which the
Software was designed (each a "Client Device"). If the Software is licensed as a
suite or bundle with more than one specified Software product, this license
applies to all such specified Software products, subject to any restrictions or
usage terms specified on the applicable price list or product packaging that apply
to any such Software products individually.
1.1 Use. The Software is licensed as a single product; it may not be used on
more than one Client Device or by more than one user at a time, except as set
forth in this Section.
1.1.1 The Software is "in use" on a Client Device when it is loaded into the
temporary memory (i.e., random-access memory or RAM) or installed into the
permanent memory (e.g., hard disk, CD-ROM, or other storage device) of that
Client Device. This license authorizes you to make only as many back-up copies
of the Software as are necessary for its lawful use and solely for back-up
purposes, provided that all such copies contain all of the Software's proprietary
notices. You shall maintain records of the number and location of all copies of
the Software and Documentation and will take all reasonable precautions to
protect the Software from unauthorized copying or use.
1.1.2 If you sell the Client Device on which the Software is installed, you will
ensure that all copies of the Software have been previously deleted.
1.1.3 You shall not decompile, reverse engineer, disassemble or otherwise
reduce any part of this Software to a humanly readable form nor permit any third
party to do so. The interface information necessary to achieve interoperability of
the Software with independently created computer programs will be provided by
Kaspersky Lab by request on payment of its reasonable costs and expenses for
procuring and supplying such information. In the event that Kaspersky Lab
notifies you that it does not intend to make such information available for any
reason, including (without limitation) costs, you shall be permitted to take such
72 Kaspersky Anti-Virus for Proxy Server

steps to achieve interoperability, provided that you only reverse engineer or


decompile the Software to the extent permitted by law.
1.1.4 You shall not make error corrections to, or otherwise modify, adapt, or
translate the Software, nor create derivative works of the Software, nor permit
any third party to copy the Software (other than as expressly permitted herein).
1.1.5 You shall not rent, lease or lend the Software to any other person, nor
transfer or sub-license your license rights to any other person.
1.1.6 You shall not use this Software in automatic, semi-automatic or manual
tools designed to create virus signatures, virus detection routines, any other data
or code for detecting malicious code or data.
1.2 Server-Mode Use. You may use the Software on a Client Device or on a
server ("Server") within a multi-user or networked environment ("Server-Mode")
only if such use is permitted in the applicable price list or product packaging for
the Software. A separate license is required for each Client Device or "seat" that
may connect to the Server at any time, regardless of whether such licensed
Client Devices or seats are concurrently connected to or actually accessing or
using the Software. Use of software or hardware that reduces the number of
Client Devices or seats directly accessing or utilizing the Software (e.g.,
"multiplexing" or "pooling" software or hardware) does not reduce the number of
licenses required (i.e., the required number of licenses would equal the number
of distinct inputs to the multiplexing or pooling software or hardware "front end").
If the number of Client Devices or seats that can connect to the Software
exceeds the number of licenses you have obtained, then you must have a
reasonable mechanism in place to ensure that your use of the Software does not
exceed the use limits specified for the license you have obtained. This license
authorizes you to make or download such copies of the Documentation for each
Client Device or seat that is licensed as are necessary for its lawful use, provided
that each such copy contains all of the Documentation’s proprietary notices.
1.3 Volume Licenses. If the Software is licensed with volume license terms
specified in the applicable product invoicing or packaging for the Software, you
may make, use or install as many additional copies of the Software on the
number of Client Devices as the volume license terms specify. You must have
reasonable mechanisms in place to ensure that the number of Client Devices on
which the Software has been installed does not exceed the number of licenses
you have obtained. This license authorizes you to make or download one copy of
the Documentation for each additional copy authorized by the volume license,
provided that each such copy contains all of the Document's proprietary notices.
2. Duration. This Agreement is effective for the period specified in the Key File
(the unique file which is required to fully enable the Software, please see Help/
about Software or Software about, for Unix/Linux version of the Software see the
notification about expiration date of the Key File) unless and until earlier
terminated as set forth herein. This Agreement will terminate automatically if you
fail to comply with any of the conditions, limitations or other requirements
Appendix C 73

described herein. Upon any termination or expiration of this Agreement, you


must immediately destroy all copies of the Software and the Documentation. You
may terminate this Agreement at any point by destroying all copies of the
Software and the Documentation.
3. Support.
(i) Kaspersky Lab will provide you with the support services ("Support Services")
as defined below for a period of one year following:
(a) Payment of its then current support charge, and:
(b) Successful completion of the Support Services Subscription Form as
provided to you with this Agreement or as available on the Kaspersky Lab
website, which will require you to produce the Key Identification File which will
have been provided to you by Kaspersky Lab with this Agreement. It shall be at
the absolute discretion of Kaspersky Lab whether or not you have satisfied this
condition for the provision of Support Services.
(ii) Support Services will terminate unless renewed annually by payment of the
then-current annual support charge and by successful completion of the Support
Services Subscription Form again.
(iii) By completion of the Support Services Subscription Form you consent to the
terms of the Kaspersky Lab Privacy Policy, which is deposited on
ww.kaspersky.com/privacy, and you explicitly consent to the transfer of data to
other countries outside your own as set out in the Privacy Policy.
(iv) "Support Services" means:
(a) Daily updates of the anti-virus database;
(b) Free software updates, including version upgrades;
(c) Extended technical support via e-mail and phone hotline provided by Vendor
and/or Reseller;
(d) Virus detection and disinfection updates 24 hours per day.
4. Ownership Rights. The Software is protected by copyright laws. Kaspersky
Lab and its suppliers own and retain all rights, titles and interests in and to the
Software, including all copyrights, patents, trademarks and other intellectual
property rights therein. Your possession, installation, or use of the Software does
not transfer any title to the intellectual property in the Software to you, and you
will not acquire any rights to the Software except as expressly set forth in this
Agreement.
5. Confidentiality. You agree that the Software and the Documentation, including
the specific design and structure of individual programs and the Key Identification
File, constitute confidential proprietary information of Kaspersky Lab. You shall
not disclose, provide, or otherwise make available such confidential information
in any form to any third party without the prior written consent of Kaspersky Lab.
74 Kaspersky Anti-Virus for Proxy Server

You shall implement reasonable security measures to protect such confidential


information, but without limitation to the foregoing shall use best endeavours to
maintain the security of the Key Identification File.
6. Limited Warranty.
(i) Kaspersky Lab warrants that for six (6) months from first download or
installation the Software purchased on a physical medium will perform
substantially in accordance with the functionality described in the Documentation
when operated properly and in the manner specified in the Documentation.
(ii) You accept all responsibility for the selection of this Software to meet your
requirements. Kaspersky Lab does not warrant that the Software and/or the
Documentation will be suitable for such requirements nor that any use will be
uninterrupted or error free.
(iii) Kaspersky Lab does not warrant that this Software identifies all known
viruses, nor that the Software will not occasionally erroneously report a virus in a
title not infected by that virus.
(iv) Your sole remedy and the entire liability of Kaspersky Lab for breach of the
warranty at paragraph (i) will be at Kaspersky Lab option, to repair, replace or
refund of the Software if reported to Kaspersky Lab or its designee during the
warranty period. You shall provide all information as may be reasonably
necessary to assist the Supplier in resolving the defective item.
(v) The warranty in (i) shall not apply if you (a) make or cause to be made any
modifications to this Software without the consent of Kaspersky Lab, (b) use the
Software in a manner for which it was not intended, or (c) use the Software other
than as permitted under this Agreement.
(vi) The warranties and conditions stated in this Agreement are in lieu of all other
conditions, warranties or other terms concerning the supply or purported supply
of, failure to supply or delay in supplying the Software or the Documentation
which might but for this paragraph (vi) have effect between the Kaspersky Lab
and you or would otherwise be implied into or incorporated into this Agreement
or any collateral contract, whether by statute, common law or otherwise, all of
which are hereby excluded (including, without limitation, the implied conditions,
warranties or other terms as to satisfactory quality, fitness for purpose or as to
the use of reasonable skill and care).
7. Limitation of Liability.
(i) Nothing in this Agreement shall exclude or limit Kaspersky Lab's liability for (a)
the tort of deceit, (b) death or personal injury caused by its breach of a common
law duty of care or any negligent breach of a term of this Agreement, or (c) any
other liability which cannot be excluded by law.
(ii) Subject to paragraph (i) above, the Supplier shall bear no liability (whether in
contract, tort, restitution or otherwise) for any of the following losses or damage
Appendix C 75

(whether such losses or damage were foreseen, foreseeable, known or


otherwise):
(a) Loss of revenue;
(b) Loss of actual or anticipated profits (including for loss of profits on contracts);
(c) Loss of the use of money;
(d) Loss of anticipated savings;
(e) Loss of business;
(f) Loss of opportunity;
(g) Loss of goodwill;
(h) Loss of reputation;
(i) Loss of, damage to or corruption of data, or:
(j) Any indirect or consequential loss or damage howsoever caused (including,
for the avoidance of doubt, where such loss or damage is of the type specified in
paragraphs (ii), (a) to (ii), (i).
(iii) Subject to paragraph (i), the liability of Kaspersky Lab (whether in contract,
tort, restitution or otherwise) arising out of or in connection with the supply of the
Software shall in no circumstances exceed a sum equal to the amount equally
paid by you for the Software.
8. (i) This Agreement contains the entire understanding between the parties
with respect to the subject matter hereof and supersedes all and any prior
understandings, undertakings and promises between you and Kaspersky Lab,
whether oral or in writing, which have been given or may be implied from
anything written or said in negotiations between us or our representatives prior to
this Agreement and all prior agreements between the parties relating to the
matters aforesaid shall cease to have effect as from the Effective Date. Save as
provided in paragraphs (ii) - (iii) below, you shall not have any remedy in respect
of an untrue statement made to you upon which you relied in entering into this
Agreement ("Misrepresentation") and Kaspersky Lab shall not have any liability
to the other than pursuant to the express terms of this Agreement.
(ii) Nothing in this Agreement shall exclude or limit Kaspersky Lab's liability
for any Misrepresentation made thereby if aware that it was untrue.
(iii) The liability of Kaspersky Lab for Misrepresentation as a fundamental
matter, including a matter fundamental to the maker's ability to perform its
obligations under this Agreement, shall be subject to the limitation of liability set
out in paragraph 7(iii).

Вам также может понравиться