[. . . ] Kaspersky Endpoint Security 8 for Mac Administrator's guide APPLICATION VERSION: 8. 0 Dear User!We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is the property of Kaspersky Lab and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] Kaspersky Endpoint Security databases are always updated, and the application modules are only updated if the corresponding box is checked (see section "Selecting the update mode and objects" on page 85). Update source Update source is a resource that contains actual files of anti-virus databases and modules for Kaspersky Endpoint Security. Network settings To download updates from Kaspersky Lab's update servers or sources other than local or network folders, your computers needs to be connected to the Internet. If the Internet connection is established using a proxy server, you should adjust the network settings (see section "Configuring connection to a proxy server" on page 88). SELECTING THE UPDATE MODE AND OBJECTS When configuring the update settings of Kaspersky Endpoint Security, it is very important to define the update object and run mode. Open the application preferences window (on page 34) and select the Update tab (see figure below). In the Run mode section, select the update task run mode. To allow the application to copy and install not only anti-virus databases but also application modules when running the update: 1. Open the application preferences window (on page 34), select the Update tab (see figure below). In the Update section, check the Update application modules box. 85 ADMINISTRATOR'S GUIDE If module updates are available during execution of the update task, Kaspersky Endpoint Security retrieves and applies them after rebooting your computer. The downloaded module updates will not be installed until the computer restarts. If the next application update becomes available before the computer is restarted and the program module updates downloaded earlier are installed, the databases are only updated. Figure 45. Update SELECTING AN UPDATE SOURCE The update source is a resource containing current files in the Kaspersky Endpoint Security anti-virus databases and modules. These are special websites where updates of databases and internal modules for all Kaspersky Lab products are stored. Kaspersky Administration Kit Administration Server is also employed as update source for Kaspersky Endpoint Security. If you cannot access Kaspersky Lab's update servers (for example, there is no Internet connection), contact Technical Support Service to receive the updates in ZIP format. You can copy the updates and upload them to an FTP or HTTP site, or save them in a local or network folder. When ordering updates on removable media, please specify if you want to receive the updates for internal Kaspersky Endpoint Security modules as well. Open application settings window (on page 34) and select the Update tab. In the window that opens, select the Update source tab (see the figure below). Edit the list of update sources, if necessary. 86 ADVANCED APPLICATION SETTINGS By default, the list of update sources only contains Kaspersky Lab update servers and Kaspersky Administration Kit Administration Server. When running an update, Kaspersky Endpoint Security refers to this list for the address of the first server on it and attempts to download the updates from this server. If the updates cannot be downloaded from the selected server, the application tries to connect and retrieve the updates from the next server. This continues until a connection is successfully established, or until all the available update servers have been tried. [. . . ] 91 T Tasks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136, 140 Threat types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Trusted zone exclusion rule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52, 128 U Update manual run. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]