Next Topic

Previous Topic

Book Contents

Antivirus (Classic) (v1.0.0.0) - 20 December 2010

Antivirus

Kaseya Antivirus 1.0 (KAV) is a new module that integrates Kaspersky Antivirus endpoint security with the Kaseya framework. Can be installed independently of Endpoint Security or Anti-Malware (Classic).

Endpoint Licensing

One or more monthly or annual antivirus licenses are issued to each endpoint. If licensing is removed from an endpoint before an entire period of licensing is used up, the remaining time for that license period can be applied to other endpoints. Automatic extension of endpoint licensing is provided as an option.

Install/Uninstall

An Install/Uninstall function, accessible from several places throughout the Antivirus module, installs and uninstalls the KAV client on managed machines.

Antivirus Configuration Profiles

Antivirus configuration profiles are provided. Each antivirus profile represents a different set of enabled or disabled antivirus options. Changes to a antivirus profile affect all machine IDs assigned that antivirus profile. Typically different types of machines or networks require different antivirus profiles. A sample profile is provided for you.

Scanning on Demand

Endpoints scanning for viruses can be scheduled or run immediately, by profile or by individual machine. Almost all threats are resolved automatically. Outstanding threats are listed on a Detections page and may require manual intervention.

Antivirus Definition Updates

Updates to antivirus definitions are downloaded to managed endpoints automatically and can be updated manually between automatic downloads.

Dashboards

Dashboards provide a graphic view of the status of all machines using Kaseya Antivirus, including top detections, machines with detections, license breakdown, and installation status.

Threat Management

Display virus threats by machine, name of threat, time of detection, status of threat, type of threat and path location of the threat.

Reporting

  • Provides an executive summary that includes scans run, threats discovered, updates performed, etc.
  • Configuration summary that details the configuration assignments

Column Sets

Columns sets provide instant selection of the appropriate columns for a given task.